VPN Technology Report
VerifiedAdded on 2019/10/09
|7
|1033
|463
Report
AI Summary
This report analyzes the challenges faced by Ullman, Manly, and Ulysses Corporation due to limitations in their existing network infrastructure. The company's growth is hindered by its reliance on a foreign telecommunication network, leading to email disruptions and limited reach. The report proposes the implementation of a VPN (Virtual Private Network) as a solution to enhance security, scalability, and reliability while reducing costs. The report details the suggested technology solution, outlining how a VPN can provide secure data sharing and remote access for employees and customers. It also addresses potential managerial and business risks, including vulnerabilities to worms, viruses, and spyware, and proposes mitigation strategies such as robust authentication, physical security measures, and up-to-date antivirus software. The conclusion emphasizes the potential benefits of VPN implementation for the organization's growth and profitability, while acknowledging the need for careful consideration of security protocols to prevent potential risks.

Ullman, Manly and Ulysses Corporation
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

VPN Technology 1
Table of Contents
The Problem of Business.................................................................................................................1
Suggested Technology solution.......................................................................................................1
Suggested Policies and Processes....................................................................................................2
Managerial and Business risks and impacts....................................................................................2
Cyber security Problems and Risks identified.................................................................................3
Mitigation strategies........................................................................................................................3
Conclusion.......................................................................................................................................3
References........................................................................................................................................5
Table of Contents
The Problem of Business.................................................................................................................1
Suggested Technology solution.......................................................................................................1
Suggested Policies and Processes....................................................................................................2
Managerial and Business risks and impacts....................................................................................2
Cyber security Problems and Risks identified.................................................................................3
Mitigation strategies........................................................................................................................3
Conclusion.......................................................................................................................................3
References........................................................................................................................................5

VPN Technology 2
The Problem of Business
Ullman, Manly and Ulysses Corporation mostly depend on its existing base of networks with
250 staff members, 75,000 global consumers in four locations in the European offices and United
States. After some time, the management of the organization noticed that UMUC grow only in a
particular location and less size of available business customers. For the purpose of enhancing
exponentially, the organization has overcome its available network of telecommunications,
which is now managing a foreign telecommunication network. The foreign network tries to
change all the problems facing the organization in its success. It subsequently deals with
different consumers and removes all e-mail disruptions which prove expensive for the
organization. To deal this problem efficiently, the organization has decided to change the
network system of organization and search for an excellence network system. The management
of the organization decided that they require an excellence network with high reliability, security
and scalability, but less expensive than the other network system. Then, CIO of the organization
suggested that VPN technology can be used to link customers and remote offices securely and to
support the growth of the organization.
Suggested Technology solution
The organization decided to utilize VPN network to avoid telecommunication network problem
in the organization. VPN network is considered as a remote data network that utilizes
telecommunication structure of public, maintaining level of security with the utilization of a
privacy process and tunnelling process. VPN can be compared with a system of leased or
The Problem of Business
Ullman, Manly and Ulysses Corporation mostly depend on its existing base of networks with
250 staff members, 75,000 global consumers in four locations in the European offices and United
States. After some time, the management of the organization noticed that UMUC grow only in a
particular location and less size of available business customers. For the purpose of enhancing
exponentially, the organization has overcome its available network of telecommunications,
which is now managing a foreign telecommunication network. The foreign network tries to
change all the problems facing the organization in its success. It subsequently deals with
different consumers and removes all e-mail disruptions which prove expensive for the
organization. To deal this problem efficiently, the organization has decided to change the
network system of organization and search for an excellence network system. The management
of the organization decided that they require an excellence network with high reliability, security
and scalability, but less expensive than the other network system. Then, CIO of the organization
suggested that VPN technology can be used to link customers and remote offices securely and to
support the growth of the organization.
Suggested Technology solution
The organization decided to utilize VPN network to avoid telecommunication network problem
in the organization. VPN network is considered as a remote data network that utilizes
telecommunication structure of public, maintaining level of security with the utilization of a
privacy process and tunnelling process. VPN can be compared with a system of leased or
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

VPN Technology 3
maintained lines that utilized by a single organization. The main aim of the organization behind
the selection of VPN is to offer the similar competencies as offered by private leased lines (Jain,
2013). A virtual private network enables the organization to have a more secure network of
resources or data sharing.
Suggested Policies and Processes
With the popularity of the internet, security becomes the main concern of every individual or
organizations. The management of the organization believes that VPNs offer real security with
which they can resolve their problem in an efficient manner. Most of the seller develops
processes that would permit network traffic to be encrypted at the edge of one network and
decrypted when it reached the organization network. This type of encrypted behaviour work as a
tunnel between the two existing network systems, even if an attacker can see the traffic, they
cannot change and read it until the changes being seen by an authorized party (Sinha, 2013).
VPN network is created with the help of encryption. Nowadays, service suppliers offer an
innovative type of trusted VPNs. All these trusted, and innovative VPNs do not offer full
security, but they provide customers with a way to establish different network sections for a
broad area of networks.
Managerial and Business risks and impacts
If the client side of the organization is highly affected by a worm, then it can choose a linking
network that saves them from the impact of worms. If a virus or spyware infects a system of
organization, then there are chances that the security password of VPN link might be disclosed
by an attacker. On the other hand, if a VPN link is infected by work, that worm can be spread to
maintained lines that utilized by a single organization. The main aim of the organization behind
the selection of VPN is to offer the similar competencies as offered by private leased lines (Jain,
2013). A virtual private network enables the organization to have a more secure network of
resources or data sharing.
Suggested Policies and Processes
With the popularity of the internet, security becomes the main concern of every individual or
organizations. The management of the organization believes that VPNs offer real security with
which they can resolve their problem in an efficient manner. Most of the seller develops
processes that would permit network traffic to be encrypted at the edge of one network and
decrypted when it reached the organization network. This type of encrypted behaviour work as a
tunnel between the two existing network systems, even if an attacker can see the traffic, they
cannot change and read it until the changes being seen by an authorized party (Sinha, 2013).
VPN network is created with the help of encryption. Nowadays, service suppliers offer an
innovative type of trusted VPNs. All these trusted, and innovative VPNs do not offer full
security, but they provide customers with a way to establish different network sections for a
broad area of networks.
Managerial and Business risks and impacts
If the client side of the organization is highly affected by a worm, then it can choose a linking
network that saves them from the impact of worms. If a virus or spyware infects a system of
organization, then there are chances that the security password of VPN link might be disclosed
by an attacker. On the other hand, if a VPN link is infected by work, that worm can be spread to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

VPN Technology 4
other network systems. It may be possible if the anti-virus security system becomes outdated and
not so effective.
Cyber security Problems and Risks identified
A laptop utilized by a customer may be connected to the wireless LAN, the internet, hotel, or
airport systems (St Juste, 2013). The security protection at all such places is insufficient for VPN
network system. If the VPN machine of the user is compromised, it will bring various negative
outcomes for the connected network.
Mitigation strategies
VPN utilize following mitigation approaches to overcome all such risk:
Efficient authentication is required when the user is connecting from different untrusted
networks such as by means of tokens or smart card. The smart card is generally utilized
to collect a profile of the user, encryption and algorithms keys.
The user of the network should remain alert about the physical security of the connected
network, especially when the authentication data is stored in the system.
The user of the network should have an anti-virus in the system, with updated version, to
stop and measure virus infections.
Conclusion
After studying all this, we can conclude that the organization can significantly overcome its
problem with the implementation of VPN network. This will ensure high-security measures in
the working of the organization. But the organization should not utilize token card and smart
other network systems. It may be possible if the anti-virus security system becomes outdated and
not so effective.
Cyber security Problems and Risks identified
A laptop utilized by a customer may be connected to the wireless LAN, the internet, hotel, or
airport systems (St Juste, 2013). The security protection at all such places is insufficient for VPN
network system. If the VPN machine of the user is compromised, it will bring various negative
outcomes for the connected network.
Mitigation strategies
VPN utilize following mitigation approaches to overcome all such risk:
Efficient authentication is required when the user is connecting from different untrusted
networks such as by means of tokens or smart card. The smart card is generally utilized
to collect a profile of the user, encryption and algorithms keys.
The user of the network should remain alert about the physical security of the connected
network, especially when the authentication data is stored in the system.
The user of the network should have an anti-virus in the system, with updated version, to
stop and measure virus infections.
Conclusion
After studying all this, we can conclude that the organization can significantly overcome its
problem with the implementation of VPN network. This will ensure high-security measures in
the working of the organization. But the organization should not utilize token card and smart

VPN Technology 5
card because these hamper the security perspective of the network in high context.
Implementation of VPN network in the organization brings various growth opportunities through
which it subsequently enhances its profit margin.
card because these hamper the security perspective of the network in high context.
Implementation of VPN network in the organization brings various growth opportunities through
which it subsequently enhances its profit margin.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

VPN Technology 6
References
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud
computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
St Juste, P., & Figueiredo, R. J. (2013, January). A peer-to-peer microblogging service based on
IP multicast and social virtual private networking. In 2013 IEEE 10th Consumer
Communications and Networking Conference (CCNC) (pp. 873-874). IEEE.
Sinha, A., Devarajan, S., & Foxhoven, P. (2013). U.S. Patent No. 8,464,335. Washington, DC:
U.S. Patent and Trademark Office.
References
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud
computing: a survey. IEEE Communications Magazine, 51(11), 24-31.
St Juste, P., & Figueiredo, R. J. (2013, January). A peer-to-peer microblogging service based on
IP multicast and social virtual private networking. In 2013 IEEE 10th Consumer
Communications and Networking Conference (CCNC) (pp. 873-874). IEEE.
Sinha, A., Devarajan, S., & Foxhoven, P. (2013). U.S. Patent No. 8,464,335. Washington, DC:
U.S. Patent and Trademark Office.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.