Assignment Task :

Purpose  The purpose of this assignment is to review existing literatures on important assessment (with VPN technologies and issues and write a report. The report must be specific ULO Mapping) to the given topics, use appropriate examples and detail of the topic given to develop a review paper. In addition, students expected to investigate the use of VPN technology by installing a demo on virtual box or laptop to demonstrate the concept. In preparing the assignment, students should acquire not only the knowledge of current technical aspects of VPN but also research, data collection, analysis and writing skills. Students should be able to demonstrate their achievements in the following unit learning outcomes: 
a. Explain the significance of VPN for contemporary organisations

b. Discuss the role of VPN to support the security of businesses

c. Demonstrate the use of VN client 

 

Assignment Topics:

Objective: Your tasks are to analyse and to write a report about the processes and the security technologies being used when you access any website (which uses HTTPS) online via a web browser, as well as having the ability to remotely accessing your company network online securely. It is a well-known fact that the Internet is a public network and every single message you exchange with the server can potentially be intercepted by attackers. You need to analyse in detail to address the technologies and techniques that can be used to prevent attackers from modifying the communication between you and web server in addition to keeping your passwords and other details safe. 

 

A. VPN, Authentication and Access Control 
You need to visit a particular web site and discuss the following points: 
1. Analyse and write report on how the browser ensures that it is communicating to the right server. Please visit a website and add screenshots also highlighting the related part. Explain how SSL and TLS provide authentication?

2. Describe how digital signatures work and what role pays in the authentication process, add the relevant screenshot from your web browser showing the details of signature. What happens during certificate verification?

3. Analyse and comment on how the server make sure that it is communicating to the right client, discuss several methods; e.g. if you are using MIT Moodie, how the server verifies that it's actually YOU? 

 

This Networking Assignment has been solved by our Networking Experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Eureka! You've stumped our genius minds (for now)! This exciting new question has our experts buzzing with curiosity. We can't wait to craft a fresh solution just for you!

  • Uploaded By : Mia
  • Posted on : July 04th, 2019

Whatsapp Tap to ChatGet instant assistance