WAN Security and Performance: An Evaluation of DMVPN Technologies

Verified

Added on  2023/04/22

|13
|776
|241
Report
AI Summary
This report evaluates the security issues and performance related to Wide Area Networks (WANs), with a specific focus on Dynamic Multipoint Virtual Private Networks (DMVPN). The study aims to identify and measure the impact of security factors on organizations using WAN technologies. It begins by outlining the aim and objectives, which include understanding WAN concepts, exploring security issues, developing security strategies, and evaluating methods to overcome WAN security challenges. The research employs a prototyping model, including requirement identification, prototype development, and review. Data collection involves both primary data from IT professionals at companies like HP, Defcon, and Cisco, and secondary data through literature review. The key findings from the literature review highlight WAN capabilities, DMVPN features, security issues such as vulnerabilities and unauthorized use, and security measures like data encryption. The report concludes with research findings, identifying WAN security policies and guidelines to overcome security-related issues and measure the performance of DMVPN. This research is aimed at helping researchers identify and overcome security issues associated with WANs.
Document Page
Evaluation of the WAN security issues
and performance
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
The purpose of study is to identify security and
performance measurement associates with Dynamic
Multipoint Virtual Private Network (DMVN).
With help of this research, investigator will be able to
measure impact of security factor on organizations and
users who are using WAN technologies in their day to
day business operations.
Document Page
Aim and objectives
Aim
The main aim of the study is to evaluate WAN security issues and
performance.
Objectives:
To understand WAN concept and principles of its implementation
To explore the wide area network security issues and policies to
overcome security
related issues
To develop and implement WAN security strategy with considering
effective security
measure
To evaluate the ways and strategies in order to overcome WAN
security issues
Document Page
Research questions
What is WAN concept and basic terminology of wide area
network regarding its implementation at large geographical area?
How wide area network security policies and guidelines can
help companies in reducing security related issues?
How WAN security strategies can be implemented for effective
security measure of network?
What are the main strategies and ways through which wide area
network related issues can be solved in a proper manner?
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Significance and scope of study
Understanding WAN technologies and principles of wide area
network implementation
Increasing awareness about Security measures and wide area
network security policies
Investigating strategies required for reducing issues associated
with the use of wide area network technologies
Document Page
Key findings from the literature
WAN capability
Capture multiple distance areas
Share resources among different branches of companies
Dynamic Multipoint Virtual Private Network(DMVN)
Establish fast moving of digital communications among different
branches
A full meshed connection between multiple sites (Anees and
Zeilinger, 2014).
Document Page
Key findings from the literature
Security issues:
The vulnerability of a WAN
Capture, evesdropping, falsification issues
Attack specific qualitative levels of information (Johnson, 2011).
Unauthorized use, information theft, and malicious damage to
files
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Key findings from the literature
Security measures
Data encryption
Callback systems
Public- and private-key security
Network operating systems with built-in
security features
Document Page
Requirement analysis [Prototyping model]
Requirement identification
Understanding of WAN concepts
Security issues associated with WAN technologies
Discuss main strategies and ways through which wide area network
related issues
Develop initial prototype
Conducting review of literature
Technical feasibility of project is checked
Secondary and primary data collection related to topic
Actual findings and facts are gathered
Statistical test is applied
Review of prototype
Findings disuses with tutor
Further enhancement
Feedback is collected in an organized manner
Changes accepted and incorporate in research
Document Page
Design specification
Primary data collection
Respondents: HP, Defcon and Cisco IT employees
Sample size: 100
Tool: Statistical software package for social science (SPSS)
Secondary data collection
Literature review [Books, Journals and online published report
on companies]
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Implementation plan
Data collection
Researcher will approach IT companies respondents
To find Security issues associated with WAN technologies and security
measures
Research gap identified
Data analysis Hypothesis is framed
Statistical tool will be applied for data analysis
Recommend and future research
Future research
Limitations of study
Way to overcome limitations
Document Page
Research findings
At the end of this study, researcher would be able to understand
the wide area network security policies and guidelines to
overcome security related issues.
It also helps researcher to measure performance and security
parameter of Dynamic Multipoint Virtual Private Network
(DMVPN).
With help of study, researcher would be able to identify and
overcome security issues associated with WAN.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]