Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment: Virtual Private Networks

Purposes

The purpose of this assignment is to review existing literatures on important VPN technologies and issues and write a report. The report must be specific to the given topics, use appropriate examples and detail of the topic given to develop a review paper. In preparing the assignment, students should acquire not only the knowledge of current technical aspects of VPN but also research, data collection, analysis and writing skills. Students should be able to demonstrate their achievements in the following unit learning outcomes:

a. Explain the significance of VPN for contemporary organisations
b. Discuss the role of VPN to support the security of businesses and corporations.

Assignment Description

Your tasks are to analyse and to write a report about the processes and the security technologies being used when you access your bank account online via a web browser. It is a well-known fact that the Internet is a public network and every single message you exchange with the server can potentially be intercepted by attackers. You need to analyse in detail what technologies and techniques are used to prevent attackers from modifying the financial transaction requests you initiate on the server and what keeps your passwords and credit card details safe on the wire between your browser and the online banking server.

You are required to address the following topics and task in details in your report:

1. The authentication process between the server and the browser.

1.1 Analytical Tasks

a) Analyse and write a report on how the browser ensures that it is communicating to the right server?
b) Describe the role of the digital signatures in this process.
c) Analyse and write a report on how the server ensures that it is communicating to the account owner?
d) Briefly describe at least three other additional techniques that can be used to achieve authentication of the clients by servers.

1.2 Practical Tasks: Open your browser, visit your online banking website and verify:

a) Which certificate authority your bank has acquired the SSL certificate from?
b) What information is embedded inside the SSL certificate presented by the server?
c) The certificates issued by which companies are installed as the trusted root certificates on your computer? Describe the purpose of the trusted root certificates.

2. The confidentiality and the integrity services used for to secure the communication between the
server and the browser.

2.1 Analytical Tasks

a) Analyse and write a report on how the server and the browser agree on which cipher suit to use?

b) Analyse and write a report on how they agree on the symmetrical secret key for the encryption and hashing algorithms?

2.2 Practical Tasks: Open your browser, visit your online banking website and verify:

d) Which version of the SSL/TLS protocol is being used?

e) What encryption algorithm is being used for confidentiality?

f) What hashing algorithm is being used for integrity?

3. The anti-replay service between the server and the browser.

3.1 Analytical Task

a) Analyse and write a report on how the protection against replay attacks are achieved between the server and the browser.

Instructions:

1. To enhance your understanding of the technology in this report you are required to describe how the technology works theoretically, as well as you need to perform some small practical activities and include the screenshots and the descriptions of them. The questions are organized in the logical order, however to make them easy to distinguish, the analytical questions are presented in blue and the
practical questions are presented in green.

2. Include cover page with the subject name, the assignment name, the student name and ID, submission date.

3. Include table of contents.

4. Include table of figures.

5. Ensure that all the figures are numbered and names. You have to refer to the figures you add in the
contexts.

6. Strictly follow the IEEE reference format for in-body citations and the references section.

7. You can use trustable online resources and documentations from well-known technology companies
such as Microsoft, Cisco, Juniper and etc.

8. No plagiarism is allowed.

9. There are no limitations to the minimum and maximum word counts included in this assignments.

However, it is expected that the report is correct, it is written to the point and using the right technical terminologies.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92793389

Have any Question?


Related Questions in Computer Network & Security

Lab activity investigate system backup and restore

Lab Activity: Investigate System Backup and Restore Tools Purpose: Assess and Document Tools to Backup and Restore the System Hard Drive for a Windows 8.1 Workstation. - Assess and document the use of a system backup too ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

What comparison of means test was used to answer the

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic status\need the entire script

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Per capita income of winterfell is 15000 with a growth rate

Per capita income of Winterfell is $15,000 with a growth rate of 4%. Per capita income of King's Landing is $25,000 with a growth rate of 0%. How long until per capita income is the same in both locations?

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As