Access the best MN610 Virtual Private Networks Assignment Help Service to achieve superior grades!

Home   Course  
Previous << || >> Next

Unit Code: MN610

Unit Title: Virtual Private Networks

Assessment Title: VPN Technologies and Security issues

Melbourne Institute of Technology

ARE YOU LOOKING FOR RELIABLE MN610 VIRTUAL PRIVATE NETWORKS ASSIGNMENT HELP SERVICES? EXPERTSMINDS.COM IS RIGHT CHOICE AS YOUR STUDY PARTNER!

Unit Learning Outcomes:

Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.

b. Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations

Question

Topic:- VPN Replacement Technologies

List the limitations/problems existed in legacy VPNs and review alternative options to resolve and overcome the problems of legacy VPNs. Address the issue of VPN security in details.

VPN Security Issues
A simple Google search of ‘VPN security' displays 135 million results. Search the internet for relevant articles/papers, and compare and analyze what these security issues are and what solutions they propose.

Answer:

VPN Technologies and Security issues

Abstract- With rapid development of information and communication technology, it becomes essential to use VPN technologies to communicate between users. VPN helps in protecting information that are transmitted over the internet. However, the security issues become the major challenge in using VPN. The technologies like firewalls, authentication and encryption can be helpful to secure the process and obtain key benefits. On the other hand, the protocols of tunneling are operated at Open System Interconnection layers. However, the most commonly used protocols are SSL, IPsec, L2TP as well as PPTP. The packers are properly configured with private non-routable IP address sent packets with IP address anywhere and extends a private network over internet. The security policies as well as guidelines on the proper utilization of VPN as well as network support is distributed to responsible parties. It has purposes to control as well as govern the VPN use. Placement of VPN entry point at the demilitarized zone can be suggested for protecting the integral network. In this perspective, it is important to develop effective procedure that would be helpful for the users to access the secure network. The paper deals with different types of security issues faced while using VPN and provide recommendation to overcome the challenges.

Keywords: VPN (Virtual private network), Extranet VP Security, User authentication, encryption.

SAVE YOUR HIGHER GRADE WITH ACQUIRING MN610 VIRTUAL PRIVATE NETWORKS ASSIGNMENT HELP & QUALITY HOMEWORK WRITING SERVICES OF EXPERTSMINDS.COM

Complete the assignment (minimum 5 and maximum 8 pages) including all the sections

I. INTRODUCTION

At current days, it becomes essential connecting internal networks from multiple locations. People from different locations have a demand for developing connection of the internal networks from multiple locations. They require to develop a secure connection to the internal private networks over internet from different outside locations like homes, airports and hotels. In this situation, security is one of the major issues during making continue access by staffs to the internal networks from insecure and external locations [3]. The VPN utilizes tunneling mechanism explained above for encapsulation of encrypted data into secured tunnel after developing the connection with openly read headers. It can cross the public network. The packets passed over the public network in the way that are not readable with appropriate keys of decryption. Hence, ensuring data is not disclosed or altered during transmission [1]. VPN provides a check regarding data integrity. It is performed using a message in order to ensure that the data has not been tampered during transmission of data. On the other hand, VPN provides as well as enforces strong user authentication [2].

The present study provides an overview of VPN security issues and possible measures to overcome the security issues during implementation of a virtual private network.

ORDER NEW MN610 VIRTUAL PRIVATE NETWORKS ASSIGNMENT & GET 100% ORIGINAL SOLUTION AND QUALITY WRITTEN CONTENTS IN WELL FORMATS AND PROPER REFERENCING.

II. LITERATURE REVIEW
• Overview of VPN:
Virtual Private Network is considered as one of the generic forms utilized in order to explain a communication network that helps to use the combination type as well as technologies and secure the connection tunneled through unsecured network [5] On the other hand, virtual private network technology provides a method to protect data transmitted over the internet through allowing the specific users in order to develop tunnel of entering internal network in securely. It is required to focus on the security measures that would be helpful to develop secure connection. On the other hand, it helps to access the resource as well as communicate through network that is insecure like internet. Virtual Private Network uses the encryption in order to provide data confidentiality.

VPN transmits data over the process of tunneling before transmission of packet. It provides information of routing that is helpful to traverse the shared as well as public network before reaching the endpoint of the tunnel. When the packets can reach to the endpoint of tunnel, the packet is de-capsulated as well as forwarded to final destination [4]. The endpoints of tunnel require supporting the same tunneling protocol. On the contrary, the personal firewalls need to be installed as well as configured appropriately on the VPN machines of client in order to block the unauthorized access to specific client. It is also considered as safe from the attack. However, there are several recent remote access that VPN clients consist of personal firewalls. The client machine needs to install anti-virus software with updated signatures in order to detect as well as prevent infections of virus. In addition, the virus need to be aware of the physical security system during making authentication of the process stored on the system. It is essential to have knowledge regarding internet security practices. Thus, accessing the network from home is an insecure channel as traffic is routed over internet. Placement of VPN entry point in the demilitarized zones can be recommend for protecting internal network. However, it is suggested not to use insure network during VPN connection as the split tunneling is utilized and a firewall along with IDS need to be utilized in order to identify as well as prevent potential attacks that come from the particular insecure networks. Unessential access to the internal networks need to be restricted properly as well as controlled.
However, open wireless networks lead to face serious risks to the users as specific attackers sitting on the networks have the scope to use various techniques for sniffing traffic over web and can hijack accounts on the websites, which do not use HTTP security protocol.

VPN Security:
• Security considerations:;
It is required to take some measures that can be helpful to overcome the security issues in VPN. The connections of VPN can be strengthened using the firewalls [2]. On the other hand, an intrusion detection and prevention system can be recommend for monitoring the attacks effectively. The anti-virus software requires to be installed on the remote clients and the network servers to prevent spreading any virus [7]. Apart from these, unsecured and unmanaged systems with the simple and any authentication are allowed in order to establish VPN connections to internal network.

Virtual private network.jpg

Figure 1: Virtual private network

On the other hand, logging as well as auditing functions need to be provided for recording network connections or any unauthorized attempts. The log needs to be reviewed on a regular basis [6]. It is important to provide training to the algorithms of network ort security administrators as well as supporting staffs and remote users in order to ensure that the following security practices as well as policies at the time of deploying as well as ongoing utilization of virtual private network.

DO YOU WANT TO EXCEL IN MN610 VIRTUAL PRIVATE NETWORKS ASSIGNMENT? HIRE TRUSTED TUTORS FROM EXPERTSMINDS AND ACHIEVE SUCCESS!

III. REPLACEMENT TECHNOLOGIES TO OVERCOME VPN SECURITY ISSUES
• Security issues
Hijacking attacks: VPNs have some major issues while making connections. A client machine can be a target of attack staging from the attack within connecting network [11]. An intruder could exploit errors as well as misconfiguration in the machine of clients. It can include VPN hijacking attacks. The process of hijacking VPN is considered as unauthorized take-over of a developed VPN connection from a remote client as well as impersonating the clients are made on connecting network.

Table 1: Risks in VPN

The VPN man-in-the-middle attack affects the traffic that is sent between communications of the parties as well as include interception, insertion, modification as well as deletion of the messages that reflects back at the sender as well as replaying previous messages as well as redirecting messages.

User authentication:
VPN does not enforce powerful user authentication by default [15]. A connection made in VPN need to be developed by an authenticated user. Whether the connection is weak for making restriction of unauthorized access. On the other hand, most of the VPN implementations have the ability to provide limited authentication methods [14]. For instance, PAP utilized in PPTP has ability transporting the user name and password in clear text. In this perspective, a third party could capture and utilize data for obtaining subsequent access to network.

Client side risks:
The VPN client machine is connected to the internet with a standard broadband connection [9]. Moreover, a system can be used by mobile user, which may be connected to internet in a wireless LAN at several networks. On the contrary, protection of security is considered as the most of the public connection points is considered as not adequate for VPN access [10]. The VPN client machine poses a risk to the security issues.

• Security measures
Extranet VP Security considerations: There are extra security consideration for developing extranet deployment mechanism that is required to be enforced appropriately. The VPN is used for prevention of accessing the internal network. Thus, accessing the rights require permission based on the access. In this perspective, a necessary source require to be available to the external partner [8]. The owners of resources has the ability to review permission of the access on a regular basis.

Client side security: It is important for the users to have string authentication needed during connection made dynamically from the disparate as well as untrusted networks. The certificates as well as smart cards are used in order to store profile of the user, encryption keys as well as algorithms [12]. When the user develops authentication properly on specific token entering appropriate PIN number, the card will display one time passcode. In addition, it will allow the access of network [1]. On the contrary, the add-on authentication system such as TACACS+, RADIUS can be helpful to develop a central authentication system accessing the private network.

Security measures for VPB.jpg

Figure 2: Security measures for VPB

On the other hand, the key exchange as well as management is helpful for securing the access. The automated key management is considered as a default protocol that is used in IPSec for determining and negotiating the protocols as well as algorithms and key. It also assists in authenticating the parties that are useful for scalable as well as widespread deployment of virtual private network. On the other hand, the IKEv2 protocol preserves many functionalities of IKEv1 protocol [7]. It also supports the network address translation traversal and offers flexibility. The IKE has the ability to support the network address translation traversal and provides flexibility. The IKE supports the process of effectively using the digital certificate. On the other hand, the users can make authentication signing the information with digital signature key. The users having authentication helps to sign in the data with the signature key. The different endpoint will verify the signature.

Category

Vulnerability type

Consequence

Cipher

Replacement of encryption with obfuscation

Traffic decryption

Cipher

Encryption disabled

Traffic in plaint text

Auth

Lacking cert usage validation

MITM

Auth

 Static key mode

Traffic decryption, MITN

Management

Unprotected interface

DoS

Table 2: Vulnerabilities in VPN apps

It is also important to set the key parameters utilized through negotiation of peers in order to define services as well as mechanisms for protection of traffic [14]. The parameters consist of algorithm identifiers like modes and keys.

EXPERTSMINDS.COM ACCEPTS INSTANT AND SHORT DEADLINES ORDER FOR MN610 VIRTUAL PRIVATE NETWORKS ASSIGNMENT - ORDER TODAY FOR EXCELLENCE!

IV. CONCLUSION
The above discussion concludes that VPN provides access of secure, private as well as internal network over the insecure public networks such as internet. Moreover, there is a number of VPN technologies that outlines among IPSec and SSL VPN, which are considered as the most common for the users. On the contrary, a secure channel of communication is opened up and tunneled with the assistance of an insecure network through VPN where the security of client side need not be overlooked. VPN subscriptions can be helpful for providing the network security resources. It is important to change radically as starting of new VPN technologies created to modern VPN. Hence, it is important to focus on more investment on the use of VPN technology.

V. FUTURE WORKS
As the VPN market has developed exponentially over the past years, the clients seek to protect data and secure their privacy. There are several methods of authentication, which an IPsec VPN gateway has the ability to work with the help of IKE for remote user authentication. The process includes hybrid authentication as well as extended authentication and make challenges and give responses about the as well as challenges and responses authentication for the encryption keys along with digital certificates. It allows the extra authentication of third party services that can be utilized to make access control procedure powerful. Apart from these, manual key management is one of the major areas that is required to recommend in the VPN security process. The secret keys as well as associations of security that are configured in the communicating peers of VPN before starting security services. The valid authentication helps to communicate that comes from the sender and not modified.

GET GUARANTEED SATISFACTION OR MONEY BACK UNDER MN610 VIRTUAL PRIVATE NETWORKS ASSIGNMENT HELP SERVICES OF EXPERTSMINDS.COM - ORDER TODAY NEW COPY OF THIS ASSIGNMENT!

Access our Melbourne Institute of Technology Assignment Help for related units and courses such as:-

  • MN504 Networked Application Management Assignment Help
  • MN506 System Management Assignment Help
  • MN691 Research Methods and Project Design Assignment Help
  • MN603 Wireless Networks and Security Assignment Help
  • MN621 Advanced network Design Assignment Help
  • MN692 Capstone Project Assignment Help
  • MN404 Fundamentals of Operating Systems and Programming Assignment Help
  • MN622 Software Defined Networking Assignment Help
  • ME605 Cloud Engineering Assignment Help
  • MN611 System Architecture Assignment Help
  • MN612 Enterprise Architecture Assignment Help
Tag This :- EM201980KUS12CN MN610 Virtual Private Networks Assignment Help

get assignment Quote

Assignment Samples

    ICT Ethical Issue Assignment Help

    ict ethical issue assignment help - The main ethical dilemma involved in this case is studied in this paper. The e ethical dilemma, considering the different

    Strategy Evaluation Assignment Help

    Examine the underlying bases of a firm''s strategy.Compare expected results with actual results.Take corrective actions to ensure that performance conforms.

Get Academic Excellence with Best Skilled Tutor! Order Assignment Now! Submit Assignment