Virtual Private Networks | My Assignment Tutor

Prepared by: Dr Sanjeeb Shrestha Moderatedby:DrAmmar Alazab March, 2021 Assessment Details and Submission GuidelinesUnit CodeBN305– T1 2021Unit TitleVirtual Private NetworksAssessment TypeIndividual AssignmentAssessment TitleAssignment 1– VPN Applications and SignificancePurpose of theassessment (withULO Mapping)The purpose of this assignment is to review existing literatures on important VPNtechnologies and issues and write a report.a. Explain the significance of VPN forcontemporary organisationsb. Discuss the role of VPN to support the security of businessesWeightAssignment 1a5%Assignment 1b 10%Total Marks100Word limit500– 700 words (for assignment 1a ) 700– 800 words (for assignment 1b)Due DateAssignment1a – Week 3, 11:59 PM, 11 April 2021Assignment 1b- Week 7, 11:59 PM, 06 May 2021SubmissionGuidelines• Submit Assignment 1a in a word document in week 3 and Assignment 1b in week7.• All work must be submitted on Moodle by the due date along with acompletedAssignment Cover Page.• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)font and 2 cm margins on all four sides of your page with appropriate sectionheadings. Make sure that all the screen shots submitted on Moodle must carryyour unique id such as MITID, names etc.• Reference sources must be cited in the text of the report and listed appropriatelyat the end in a reference list using IEEE referencing style.ExtensionAcademicMisconductIf an extension of time to submit work is required, a Special ConsiderationApplication must be submitted directly through AMS. You must submit thisapplication within three working days of the assessment due date. Furtherinformation is available at:http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/specialconsiderationdefermentAcademic Misconduct is a serious offence. Depending on the seriousness of thecase, penalties can vary from a written warning or zero marks to exclusion fromthe course or rescinding the degree. Students should make themselves familiarwith the full policy and procedure available at:http://www.mit.edu.au/aboutmit/institute-publications/policies- procedures-and-guidelines/PlagiarismAcademic-Misconduct-Policy- Procedure.For further information, please refer tothe Academic Integrity BN305 Page 3 of 5Prepared by: Dr Sanjeeb Shrestha Moderatedby:DrAmmar Alazab March, 2021Assignment1a (Literature Review):Task 1 – Research on at least 5 different use-cases (for example; Hospitality, Banking, Defense, etc.) ofVPN implementation in the industry and critically analyse a) the need, b) robustness and c) significanceof VPN.• You need to explain the significance of VPN for contemporary organizations. Hint: It isgood to have different encryption protocols for VPN implementation, e.g.,comparison of SSL/VPN, IPSEC/VPN, L2VPN, etc.Task 2 – Discuss whether alternative technologies to VPN exists which would benefit your chosenindustries.• You need to research whether there is any substitute for VPN. Compare and contrastany 3 of them, if you think that they exist.Assignment 1bTask 3 – Feedback from Assignment 1aIt is mandatory to include and reflect on the feedback for Assignment 1a.Task 4 – Protocol and scenario analysisa) Compare and contrast layer 2 and layer 3 VPN protocols with their characterstics.b) Discuss a scenario where you think VPN transport modes is suitable. Illustrate the frame format in yourexplanation.Task 5 – Process and Proceduesa) Illustrate the components that are required in Phase 1 IKEv1.b) Explain the Diffie-Hellman (DH) key exchange and its verlernability to the Man-in-the-Middle attack.c) Critique on the usage of Internet Key Exchange v2 (IKEv2). Illustrate how IKEv2 works with an appropriatediagram.BN305 Page 4 of 5Prepared by: Dr Sanjeeb Shrestha Moderatedby:DrAmmar Alazab March, 2021Marking Criteria QuestionsDescriptionMarksAssignment 1aTask 1- Research on at least 5 differentuse-cases of VPN implementation inindustry and critically analyse a) theneed, b) robustness and c) significanceof VPN.You need to explain the significance of VPN forcontemporaryorganizations. Hint: It is good tohave different encryption protocols for VPNimplementation, including a comparison ofSSL/VPN and IPSEC/VPN.5+5+5=15Task 2- Discuss whether alternativetechnologies to VPN existswhichwould benefit your chosen industries.You need to research whether there is anysubstituteforVPN. Compare and contrast any 3of them, if you think that they exist.5+5+5=15Assignment 1bTask- 3 Feedback from assignment 1aStudents should include the feedback receivedfor assignment1a and clearly mention how is itincorporated for making assignment 1b better.10Task 4- Protocol and scenario analysisCompare and contrast different VPNprotocols with their characterstics.Discuss the scenario where you thinkVPN tunnel andtransport modes aresuitable. Illustrate the frame format inyour explanation.Students maytake protocols such as PPTP, L2TP,L2F, IPSec etc.Students should clearly explain the scenario andprove the validity of the modes adapted.1010Task 5- Process and ProceduesIllustrate with an appropriate diagramthe Internet Security Association andKey Management Protocol (ISAKMP)process for Security Association (SA)with peers.Explain the Diffie-Hellman (DH) keyexchange and itsverlernability to theMan-in-the-Middle attack.Critique on the usage of Internet KeyExchange v2 (IKEv2). Illustrate howIKEv2 works with an appropriatediagram.Students should clearly explain the process withappropriate diagram.Students shouldclearly explain the process withappropriate diagram.Students should clearly explain the process withappropriate diagram.101510 BN305 Page 5 of 5Prepared by: Dr Sanjeeb Shrestha Moderatedby:DrAmmar Alazab March, 2021 ReferencesFollow IEEE reference style and use referencesfrom trustworthy sources.5Total100 BN305 Page 5 of 5Prepared by: Dr Sanjeeb Shrestha Moderatedby:DrAmmar Alazab March, 2021Marking Rubric HD>80%D=70-79%C=60-69%P=50-59%F

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published. Required fields are marked *