Essay Available:
Pages:
3 pages/≈825 words
Sources:
-1
Style:
APA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:
Week 8 Assignment - IPsec, SLL/TLS Standards, and VPN Security
Essay Instructions:
Make sure to add 3-4 references make it apa
Overview
Virtual Private Networks (VPNs) provide a secure data flow between two endpoints. There are not only different types of VPNs, but there are also different Internet security standards for implementing security in these different VPN types.
In this assignment, you will classify the three different types of Virtual Private Networks (VPNs). You will compare the features of the IPsec and SLL/TLS Internet security standards. You will then evaluate these two Internet security standards for implementing security in the three different types of VPNs.
Instructions
Write a 3 - 5 page paper in which you:
Classify the three different types of Private Networks (VPNs).
Distinguish the characteristics of each type in terms of configuration (e.g., host-to-host), transmission technology (e.g., multiplexing), and ease of implementation.
Compare the two different Internet security standards of IPsec and SLL/TLS in terms of features they provide for security, strengths, and weaknesses.
Evaluate the IPsec and SLL/TLS standards for implementing security in the three different types of VPNs.
Your evaluation for each VPN type should include the VPN type, your proposed Internet standard for implementing security in this type of VPN, and the rationale behind your evaluation.
Reflect on your learning experience in this assignment, the lessons you learned, and how this experience would apply to your personal or professional life.
Essay Sample Content Preview:
Week 8 Assignment - IPsec, SLL/TLS Standards, and VPN Security
Name:
Institution:
Course:
Instructor:
Date:
Week 8 Assignment - IPsec, SLL/TLS Standards, and VPN Security
Introduction
The Virtual Private Network (VPN) accords internet users protection when utilizing network connections more so when using public networks (Harmening, 2017). VPNs offer this protection by encrypting internet traffic and hiding one's identity online. The protection provides security to online users because third parties cannot track online engagements; hence, one's data is secured using real-time encryption (Harmening, 2017). VPNs can hide one's IP address by redirecting the IP address to a remote server through a particular remote server. Therefore, the VPN server serves to provide the data on your behalf. The VPN works similarly to a filter. VPNs protect against cyber insecurities by hackers and cyber criminals (Harmening, 2017). Several benefits can be attributed to the use of a VPN. One of the benefits is safe encryption, which enables one to read data on public networks. One's activities are concealed when using public networks. The other benefit is hiding one's accurate or actual location by acting as a proxy. The server in another country will provide the location. Additionally, the VPN location spoofing gives one accessibility to regional information and content. Some regions utilize their regional websites to restrict access to their content.
The Three Different Types of Private Networks (VPNs)
Remote Access VPN
Remote Access VPN permits people online to use private networks remotely (Rosenbaum et al., 2003). This type of VPN is prevalent among telecommuters or employed individuals trying to securely access resources remotely for the company they are working for. Remote Access VPNs provide access to corporate networks using the client's installed software to establish secure connections.
Site-to-Site VPN
The other type of VPN is the site-to-site VPN, which establishes a safe connection between two or more physical locations (Rosenbaum et al., 2003). Examples of such physical locations are a branch office and a data center. Site-to-site VPN secures communication between the physical locations connected through the internet (Rosenbaum et al., 2003). Corporations benefit from this type of VPN as it extends their corporate networks to several locations.
Extranet-bas...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now: