Prepared by: Dr. Ammar Alazab XXXXXXXXXXModerated by: A/Prof. Tony Jan March, 2019 Assessment Details and Submission Guidelines Trimester T1, 2020 Unit Code MN610 Unit Title Virtual Private Networks...

1 answer below »
Assignment and marking criteria included Just i want part A


Prepared by: Dr. Ammar Alazab Moderated by: A/Prof. Tony Jan March, 2019   Assessment Details and Submission Guidelines  Trimester  T1, 2020  Unit Code  MN610  Unit Title  Virtual Private Networks  Assessment  Author  Dr Ammar Alazab (Unit Moderator)  Dr Nirzhar Saha (Unit Coordinator)  Assessment Type  Individual (Assignment 1)  Assessment Title  Assignment 1 – VPN Technologies and Security issues  Unit  Learning  Outcomes  covered  in  this  assessment  Students  should  be  able  to  demonstrate  their  achievements  in  the  following  unit  learning outcomes:  a. Analyse and discuss the significance of VPN for contemporary organisations and how  it addresses their concerns and security issues.  b. Explain the role of VPN, its limitations and works done to address these limitations as  well as to supporting the security of businesses and corporations   Weight  Assignment 1A – 4.5%   Assignment 1B – 10.5%  Total Marks  Total Marks 100  Assignment 1A – 30 Marks   Assignment 1B – 70Marks  Word limit  See instructions  Due Date  Assignment 1a‐Week 3, Tuesday 6:00 PM, 31/03/2020   Assignment 1b‐Week 7, Tuesday 6:00 PM, 28/4/2020   Submission  Guidelines   All work must be  submitted on Moodle by  the due date along with a  completed  Assignment Cover Page.    The assignment must be in MS Word format, 1.5 spacing, 11‐pt Calibri (Body) font  and 2 cm margins on all four sides of your page with appropriate section headings.    Reference sources must be cited in the text of the report, and listed appropriately  at the end in a reference list using IEEE referencing style for School of Information  Technology and Engineering.  Extension   If  an  extension  of  time  to  submit  work  is  required,  a  Special  Consideration  Application  must  be  submitted  directly  through  AMS.  You  must  submit  this  application  within  three  working  days  of  the  assessment  due  date.  Further  information  is  available  at:  http://www.mit.edu.au/about‐mit/institute‐ publications/policies‐procedures‐and‐guidelines/specialconsiderationdeferment  Academic  Misconduct       Academic Misconduct is a serious offence. Depending on the seriousness of the case,  penalties can vary from a written warning or zero marks to exclusion from the course  or  rescinding  the degree. Students  should make  themselves  familiar with  the  full  policy  and  procedure  available  at:  http://www.mit.edu.au/about‐mit/institute‐ publications/policies‐procedures‐and‐guidelines/Plagiarism‐Academic‐ Misconduct‐Policy‐Procedure.  For  further  information,  please  refer  to  the  Academic Integrity Section in your Unit Description.         MN610 Virtual Private Networks Page 2 of total pages Prepared by: Dr Nirzhar Saha Moderated by: Dr Ammar Alazab March, 2020 Assignment Description    Tasks:  There are two parts to this assignment, i.e. part A and part B.  A. Write a review article for the following topics depending on the last digit of your ID: select Topic 1 if  it ends in an ‘odd’ number or Topic 2 if it ends in an ‘even’ number.         30 marks  B. Presentation (to present in 8‐10 slides only in 6‐8 minutes during Laboratory time). Students should  understand the work presented in part A and they should base their presentation based on their  report in part A                        70 marks  Part A description:  1. Topic 1 ‐  Establishing Cloud Computing Security with VPN   Cloud storage is a service model in which data is maintained, managed, backed up remotely and  made available to users over a network or internet. It permits the client to store files online so that  the user can access them from any location via the internet. The provider company makes them  available to the user online by keeping the uploaded files on an external server. A major challenge  for cloud computing providers is to deliver sufficient security levels to protect users' data. A lot of  research has been carried out with this target.   Discuss how to secure connectivity to public cloud networks with VPN with different scenarios.  Evaluate public cloud performance considering varying security schemes of firewalls and VPNs under  the four scenarios: no firewall no VPN, firewall‐only, VPN‐only and a combination of firewall and  VPN. Investigate the impacts of using VPN together with firewall on cloud computing performance.   Address the issue(s) of VPN security in details as described in common part section   2. Topic 2 –  Secure remote access approaches and VPN Replacement Technologies   Secure remote access is a method of monitoring which combines a hardware and software system to  simplify remote network access. Discuss about their similarity and compare secure remote access  approaches with VPN from the security standpoint.   Legacy VPNs has had some major drawbacks and problems such as the ones described below. There  have been attempts to resolve the issues, and some technologies are being deployed as alternatives, e.g.  Microsoft DirectAccess, SoftEther VPN etc. Discuss the limitations/problems existed in legacy VPNs and  recommend alternative options to resolve and overcome the problems of legacy VPNs. Address the issue  of VPN security in details as described in common part section.   Common Part – VPN Security Issues  Fundamentally, VPN is known as being secure and safe; however, there are still many issues with regards to  security aspects. A simple Google search of ‘VPN security’ displays 135 million results. Search the internet for  relevant articles/papers, and compare and analyze what these security issues are and what solutions they  propose.  MN610 Virtual Private Networks Page 3 of total pages Prepared by: Dr Nirzhar Saha Moderated by: Dr Ammar Alazab March, 2020  http://www.pcworld.com/article/2943472/vpn‐users‐beware‐you‐may‐not‐be‐as‐safe‐as‐you‐ think‐you‐are.html   https://www.digitaltrends.com/computing/commercial‐vpn‐huge‐security‐flaws/   https://security.stackexchange.com/questions/89017/what‐are‐security‐risks‐of‐connecting‐to‐ my‐home‐vpn‐from‐my‐work   https://www.sans.org/reading‐room/whitepapers/vpns/remote‐access‐vpn‐security‐concerns‐ policy‐enforcement‐881   https://www.belden.com/blog/industrial‐ethernet/secure‐remote‐access‐vs‐vpns‐a‐guide‐to‐ the‐challenges‐and‐benefits   https://securityboulevard.com/2019/08/types‐of‐remote‐access‐pros‐and‐cons/    Instructions:   Prepare your article as below  1. Go to the IEEE website and download the WORD template for the format.  https://www.ieee.org/publications_standards/publications/authors/author_templates.html  2. Another  link  for  the  template:  https://www.ieee.org/publications_standards/publications/journmag/ieee_tj_template_17.pdf  3. Read and familiarize yourself with the instructions carefully.  4. Prepare a paper using the IEEE format and the example attached. Follow the template if there are any  confusions.  Also,  refer  to  the  link  below  to  have  ideas  how  to  start  (see  section  6).  (https://www.ieee.org/publications_standards/publications/authors/author_guide_interactive.pdf)  5. Complete the assignment (minimum 5 and maximum 8 pages) including all the sections below. The  number of words will be counted thoroughly and you must keep the minimum number of words to  avoid any penalties.   Title               (maximum 15 words)   Abstract               (200 – 250 words)   Introduction             (300 – 500 words)   Literature Review             (500 – 1000 words)   Main body               (500 – 100 words)   Conclusion              (200 – 300 words)   Future Works             (150 – 300 words)   References              (minimum 10 references)  6. The article must be a ‘Review’1 article including at least 5 references and not more than 25.  1 See http://www.editage.com/insights/6-article-types-that-journals-publish-a-guide-for-early-career-researchers MN610 Virtual Private Networks Page 4 of total pages Prepared by: Dr Nirzhar Saha Moderated by: Dr Ammar Alazab March, 2020 7. Strictly follow the IEEE reference format for in‐body citations and the references section.   8. See the attached files for guidance on how to prepare a review paper. You can also find thorough  instructions from IEEE and the Internet.  9. Contents must include:   History and background of the topic   What are the challenges and drawbacks, what solutions and workouts they found   Possible options (solutions) and future research areas proposed   Scopes of topic, progress of developments such as requirements, benchmarking, purposes &  objectives, stakeholders, owners, roles and responsibilities where applicable.   Flowchart   Include a minimum of two (2) figures to show the overall concept and summarized overview of  the topic from the review of minimum 10 – 15 (but not limited to) papers.   Include a couple of tables to summarize the result of findings   How each organization approaches, initiates, develops procedures and ownerships, and what  results they got, and how it affected their businesses.   What you conclude in terms of the topic/solutions to implement in an organization. Consider  other aspects to include for a good review paper.  10. Remember to strictly follow the template and the instructions above to avoid penalties.  ieee_tj_template_17 .docx PAN final draft_revised.pdf Instruction for Presentation.docx     Part B description:  Prepare slides (between 8 – 10 slides) for presentation during the lab class. Read the instruction attached  carefully.          MN610 Virtual Private Networks Page 5 of total pages Prepared by: Dr Nirzhar Saha Moderated by: Dr Ammar Alazab March, 2020 Marking criteria:  Example of marking criteria is shown in following table. Marks are allocated as follows:  Note: The marking criteria varies for each assignment  Section to be included in  the report  Detailed Description of the Criteria  Marks  Conforming to the  template and format  No marks will be given and severe penalties will apply for  any breach of the format and template. Fonts, sizes,  spacing, captions, headings etc. will also be checked  thoroughly. Be thorough and follow fully when using the  template and format instruction to avoid penalties.  2  Figures and tables  created  They should be created yourself and not copied from  elsewhere. For full marks you should create at least 2  figures and 2 tables.  3  Main sections  Main body structures and contents quality including word  limit.  10  Literature review  Severe penalties apply for simple listing and describing. It  should be a logically support analysis that reaches the  review conclusion that should be included at the end of  the section. Check word limit.  10  In body citation  Strictly follow the order and instruction by IEEE. Check  when/where to put the citation. See attached files and  search the internet for guidelines  3  References section  Check whether they follow the instruction. Otherwise, no  marks will be provided  2  Assignment part b  Responses to Part A  Addressing the feedback provided   in Part 1 of the  assignment  20  Assignment part B‐  Presentation  Presentation skills and materials quality  50  Total  100    Example Marking Rubric for Assignment #: Total Marks 100  Note: The marking criteria varies for each assignment  Marking  Rubric  Criteria/  Grades  High  Distinction   (HD)  [Excellent]  >80%   Distinction  (D) [Very  Good]  70%‐80%  Credits  (C) [Good]  60%‐70%  Pass (P)  [Satisfactory]  50%‐60%  Fail (N)  [Unsatisfactory] <50%  criteria 1  concise  and  specific  to  the  project   topics  are  relevant  and  soundly  analysed.     generally  relevant  and  analysed.     some  relevance  and  briefly  presented.     this  is  not  relevant  to  the  assignment  topic.     criteria 2  demonstrated  excellent  ability to think  critically and  sourced  reference  demonstrated  excellent  ability  to  think  critically  but  did  not  source  reference  demonstrated  ability  to  think  critically  and  sourced  reference  material  appropriately   demonstrated  ability  to  think  critically  and  did  not  source  reference  material  appropriately   did  not  demonstrate  ability  to  think  critically and did  not  source  reference  mn610 virtual private networks page 6 of total pages prepared by: dr nirzhar saha moderated by: dr ammar alazab march, 2020 material  appropriately   material  appropriately      material  appropriately   criteria 3  demonstrated  excellent  ability  to  think  critically  and  sourced  reference  material  appropriately   demonstrated  excellent  ability  to  think  critically  but  did  not  source  reference  material  appropriately   demonstrated  ability  to  think  critically  and  sourced  reference  material  appropriately     demonstrated  ability  to  think  critically  and  did  not  source  reference  material  appropriately     did  not  demonstrate  ability  to  think  critically and did  not  source  reference  material  appropriately   criteria 4  all  elements  are  present  and  very  well  integrated.   components  present  with  good cohesive    components  present and  mostly well  integrated  most  components  present     proposal  lacks  structure.        criteria 5  logic  is  clear  and  easy  to  follow  with  strong  arguments   consistency  logical  and  convincing     mostly  consistent  logical  and  convincing   adequate  cohesion and  conviction     argument  is  confused  and  disjointed     criteria 6  clear  styles  with  excellent  source  of  references.   clear  referencing  style   generally  good  referencing  style   sometimes  clear  referencing  style   lacks  consistency  with  many  errors criteria 1 ="" concise ="" and ="" specific ="" to ="" the ="" project  ="" topics ="" are ="" relevant ="" and ="" soundly ="" analysed.  =""  ="" generally ="" relevant ="" and ="" analysed.  =""  ="" some ="" relevance ="" and ="" briefly ="" presented.  =""  ="" this ="" is ="" not ="" relevant ="" to ="" the ="" assignment ="" topic.  =""  ="" criteria 2 ="" demonstrated ="" excellent ="" ability to think ="" critically and ="" sourced ="" reference ="" demonstrated ="" excellent ="" ability ="" to ="" think ="" critically ="" but ="" did ="" not ="" source ="" reference ="" demonstrated ="" ability ="" to ="" think ="" critically ="" and ="" sourced ="" reference ="" material ="" appropriately  ="" demonstrated ="" ability ="" to ="" think ="" critically ="" and ="" did ="" not ="" source ="" reference ="" material ="" appropriately  ="" did ="" not ="" demonstrate ="" ability ="" to ="" think ="" critically and did ="" not ="" source ="" reference ="" mn610="" virtual="" private="" networks="" page="" 6="" of="" total="" pages="" prepared="" by:="" dr="" nirzhar="" saha="" moderated="" by:="" dr="" ammar="" alazab="" march,="" 2020="" material ="" appropriately  ="" material ="" appropriately =""  =""  ="" material ="" appropriately  ="" criteria 3 ="" demonstrated ="" excellent ="" ability ="" to ="" think ="" critically ="" and ="" sourced ="" reference ="" material ="" appropriately  ="" demonstrated ="" excellent ="" ability ="" to ="" think ="" critically ="" but ="" did ="" not ="" source ="" reference ="" material ="" appropriately  ="" demonstrated ="" ability ="" to ="" think ="" critically ="" and ="" sourced ="" reference ="" material ="" appropriately  =""  ="" demonstrated ="" ability ="" to ="" think ="" critically ="" and ="" did ="" not ="" source ="" reference ="" material ="" appropriately  =""  ="" did ="" not ="" demonstrate ="" ability ="" to ="" think ="" critically and did ="" not ="" source ="" reference ="" material ="" appropriately  ="" criteria 4 ="" all ="" elements ="" are ="" present ="" and ="" very ="" well ="" integrated.  ="" components ="" present ="" with ="" good cohesive =""  ="" components ="" present and ="" mostly well ="" integrated ="" most ="" components ="" present  =""  ="" proposal ="" lacks ="" structure.  =""   =""  ="" criteria 5 ="" logic ="" is ="" clear ="" and ="" easy ="" to ="" follow ="" with ="" strong ="" arguments  ="" consistency ="" logical ="" and ="" convincing  =""  ="" mostly ="" consistent ="" logical ="" and ="" convincing  ="" adequate ="" cohesion and ="" conviction  =""  ="" argument ="" is ="" confused ="" and ="" disjointed  =""  ="" criteria 6 ="" clear ="" styles ="" with ="" excellent ="" source ="" of ="" references.  ="" clear ="" referencing ="" style  ="" generally ="" good ="" referencing ="" style  ="" sometimes ="" clear ="" referencing ="" style  ="" lacks ="" consistency ="" with ="" many ="">
Answered Same DayApr 05, 2021MN610

Answer To: Prepared by: Dr. Ammar Alazab XXXXXXXXXXModerated by: A/Prof. Tony Jan March, 2019...

Akriti answered on Apr 06 2021
144 Votes
Secure remote access approaches and VPN replacement technologies
Abstract
With the rapid growth and advancement in the mobile and internet services along with the development in the terminals of artificial intelligence there is a noticeable raising demand and comparatively more intense than before of remote access networks and technologies which will help the us
er to access the remote areas and locations at their convenience. The best suitable and available solution to this problem is VPN that is more commonly termed as virtual private networks. With its modern and advanced technology realized with the help of various applicable protocols of security and the tunnel mechanism. But these protocols constrains the same and hence is suffered by the issues related to flexibility and are not able to meet the customer demand and the same cannot be customized as per there demand and requirements. Hence it is quite challenging for the enterprise as well as the customer to opt for more flexible and comparatively more customized process which will enable the customers and employees to make the remote access to the several intranet networks. The new and amended VPN which works upon the layered based technologies for providing services with an advanced feature of intercepting the data into packets which will be easier and convenient at both the ends.
Introduction
A VPN is considered to be the most common and efficient technology used for the e purpose of creating several encrypted connection over the networks which are though secured but provide comparatively less secure services to the customers and the enterprise as a whole. The advantage of using the virtual private network is that it provides the justified and appropriate sense of security to the systems which are being connected to the same as the underlying infrastructure of the networks alone can’t provide the same to the users. The most common VPNs that are being out to use are remote access virtual networks.
Various Doppler weathers radars are being put to use to identify and detect the several procedures, scatter and display the data in the meteorological form to a large section of the society or over the great areas. The Doppler technology have opened various new scopes and trends in the radar meteorology and have resulted in enhancing the performance of various radars of weather critically and significantly. The virtual networks used in the radars in addition to the new and advanced capacities of the data casting abilities also serves and plays a key role at the time of disasters like cyclones for the purpose of tracking and making analysis.
Remote access virtual networks also help in providing and building a connection which is safe and encrypted, among the various networks of the organization to the remote machines which are made available at the remote areas of the radar stations for the purpose of transmitting and transforming the data. This is implemented and done with the help of generating n encrypted IPsec tunnel with making the sue of various connection over the internet which are being provided by the various service providers [1].
Literature review
According to the authors view a virtual private network is considered as a method or procedure which involves the concept of identifying and receiving the request of the various mobile devices od connecting the same to the available networks or to the available private networks, to identify and figure out that whether the subscriber is pursuing in a security data set or not and according to the outcome authenticate the same and permitting the user and to grant them the access of the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here