Question? Call Us  +1 (817) 546-4770

MN610 Virtual Private Networks For The Sensitive Data

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

MN610 Virtual Private Networks For The Sensitive Data

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

MN610 Virtual Private Networks For The Sensitive Data

0 Download13 Pages / 3,163 Words

Course Code: MN610
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Questions:
a. Analyse and discuss the significance of VPN for contemporary organisations and how it addresses their concerns and security issues.
 
b.Explain the role of VPN, its limitations and works done to address these limitations as well as to supporting the security of businesses and corporations
Answer:
Introduction
The virtual private networks or the VPNs are the form of the connection that is used for the purpose of adding extra security to a public or private network [2]. These networks are often used by the public networks for the process of the protecting of the sensitive data. The VPN’s helps in the process of the hiding of the Ip address. It also helps in the process of the encrypting the data and block the websites for the process of incrsing the security [5]. The concept of the VPN is very much older since the beginning of the networking and the internet. It can be explained as one of the most simple way which helps in the process of the increasing the security of a computer.  The use of the VPn was first introduced in the year of the 2000 in order to enhance the security of the devices in organisation. This paper focus on the details about the Virtual private networks and how they have changed the terms of the networking with added on security and the other features.  The paper includes the introduction to the VPN that is the virtual private networks. A literature review about one of the most one of the most famous article that have been made by the researchers in order to study the details about the virtual private network and what were the major changes that were made in the history in order to make the VPn technology more strong and secure. Further this paper includes the basic concepts of the technology [6]. Further how the technology have helped the business organisation in increasing the security standards of the data and how these standards have helped in keeping the data safe from the cribber crimes is also one of the major part of the paper. In addition to all these the major security protocols of the VPN is also a major part of the paper. The technology of the VPN have helped many of the organisations like the Google and the Microsoft in the process of defining new rules of security and the standards in order to enhance the details of the customers and the consumers. Further these have also helped the organisation is maintaining a proper security of the details about the organisations. In the market of the internet there are many of the VPN services that are available for the users in order to access them to maintain the proper society [10]. Some of these are free while of these are very much high costly and provide some of the best world class features to the customers. It can be said that the VPN has changes the concept of the modern term of the security of the internet. These features are made in such a way that the user gest most of the enhancement in the terms of the security and reduces the risk of the vulnerability in the internet [4]. It must be said that VPN must be used in order to make sure that the user is secured in the online world.
Literature Review
This is one of the major article in the field of the virtual private networks which explains the importance of the dynamic routing protocol over the better analysis of the multi-port virtual networks [1]. The authors of the paper have done a deep researchers on the fact that how the dynamic routing by means of the virtual private network can intensification the safety protocols of an initiation.  According to the researchers “D.M.V.P.N.” is an explanation for the dynamic formation of virtual Private IP tunnels in between several sites routinely, swiftly and with minimum configuration [3]. Routing procedures are factor equipment main parts of the DMVPN explanation, this ensures smooth establishment of tunnels having a main control on network’s behaviour and elated requests, many works have been conducted assessing the performances of DMVPN network with various routing protocols [13]. Further this broadsheet improves and accompaniments other trainings, firstly by submission suitable formations of routing protocols recommended for a scalable DMVPN network, secondly by studying scalability of DMVPN by varying number of sites and dynamic routing protocols.  The researchers further explains the dynamic routing protocols on the DMPVN networks. In order to provide more information about the system of the dynamic routing the researchers have to do some of the major testing using the concepts of the networking [15]. Further explaining the topic it is said with the enhance mend of the of the interiors gateway protocol system the standards of the generic protocols in the process of the tunnelling the encapsulations and explaining the specifications of the combination of the single and multiple channels. Further the researchers explains the NHRP or the Next Hop Resolution Protocol is a resolution protocol similar to the ARP and RARP on frame relay network, NHRP is used by a Spoke connected to Non Broadcast Multi-Access “NBMA” to determine the IP address of the NBMA Next-Hop physical address. 
Also the details of the IPsec is well explained in the paper. The researchers explains the network layer protocol, IPsec is a protocol suite to ensure Internet Protocol “IP” security, existing IPsec implementations usually include, Encapsulation Security Payload “ESP” and Authentication Header protocol “AH”, ESP protocol ensure confidentiality. Further entering into the details of the paper the researchers properly explains the open shortest path first property of the VPN. The OSPF is used by both the Ipv4 and the Ipv6 is order to enhance the security features of the network. The rating table can also to well understand by studying this property of the researchers. Some of the major things that have been missed in the property of explaining the paper is the backlogs and the security protocol[s of the vPn. The security related backlogs is well explained by the [] in the journal of the researchers in order to enhance the system and the security of the internet technology
Concluding the topic the researchers claim that the throughput and queuing delay shows the effect of the functionality of the security of the paper in the process of the setting up of the VPN.
Significance of VPN
As earlier explained in the paper the VPN or the virtual private network can be explained as the technology which helps in users off the internet to access the internet in a safer manner without any interruption from the outside threats. A virtual private network practises a public network’s infrastructure to make the connections among geographically dispersed nodes, instead of using cables owned or leased exclusively for one single network’s use, eg using of network that as is typical for a wide area network .The VPN can be called as the security guard of the internet door which helps the organisation in maintaining a proper security standards of the data that are present in the organisation.  The VPN technology helps in the property of the securing the public network in the public networks in order to enhance the quality of the data standards. In terms of the organisation level the major advantages that the vPn technology provides are the securing the network infrastructure and maintain the network scalability. If the network of the organisation is secured then it also helps the organisation to attract more and more customer who looks for the property of the security of the data that are kept in the organization [18]. Some of the major helps that the VPN provides is the

It greatly reduces the chances of any cybercrime breaches. The use of the VPN helps the organisation to keep a look at the incoming traffic in the network of the organisation hence reducing the chances of any virus or malware to enter the system of the orgasaition. Further the use of the VPN ensure that these things are automatically blocked so that no user can manually encourage such things in the organisation system.
VPN helps in the production: Thee use of the VPN helps in the property that the user feels safe when connected to any public network [19]. Hence the user can be assured that the data present in the system is secured and hence increases the productivity of the organisation.
VPN keeps the clients secured: When any client of the organisation is giving the personal data to any organisation for any purpose then the client would must need that the data given by the client is safe and secured and is not leaked to the public internet [14]. Hence using a proper VPN helps the customer to understand that the data of the customer is very much secured and cannot be stole or any mishap can happen with the data of the client.
Let’s the menageries to control the input and the output of the data in any organisation. It is not always the case threats come from the outside of the organisation us sometimes the threat can be inside the organisation. The VPN helps in this matter also as the managers of the organisation can keep an eye on all the traffic that is passed through the network of the organization and hence the data of the organisation is safe and secured. Also it can help the organisation to check which type of data is sent by the employees of the organisation to the outside world, that is important of not and how this can hamper the security of the organisation.

These were some of the major area where the VPN helps the organization in maintaining the secrete of the data of the organization [11]. IN terms of the personal level the use of the VPN can be very much useful. The facts are same as it helps in the proper maintence of the security in a very personal level. One of the major thing that the VPN helps with is maintaining the anonymity in the public networks. The VPN helps in the maintaining the proper anonymity such that the IP address of the user is not revealed to any public network and hence ensuring proper data security to the user [12]. It must be said that the use of the VPN is one of major good practice that must be done in both personal and organisational level in order to ensure proper security of the data that are present in the network.
VPN Security Issues
In any technology when there is good side there is also a bad side of it. IN case of the VPN also the scenario remains the same [9]. Apart from all the security measures it provides to any user may also effect the regular work of the same due to some of the major drawbacks in the system of the VPN. One of the major security concern that have come up by many of the orgasaition is that in the market of the internet there are several of the VPN software are present some are free while some of them are paid versions. The important point that is to be kept in mid that not all the security VPN claiming so are secured. Some of these are made by the hackers in order to dupe the user and enter the network of the user in order to take information out of the source [7]. There have been numerous cases that the VPNs mostly the free ones are stealing the data from the host network. Some users at the personal level use the forms of the VPN in order to go to the dark web. This is one of the major mistakes that are done as it may hamper the entire network that is present and steal the information of the user. IN the recent history the researchers in London have found out a new leakage of the Ipv6 protocols which helps the hoax VPN to collect the data of the user.
The intruders can use the staging point or the miss configuration of the VPN in order to access information from the network. One of the major problem that is seen by many of the organization is the VPN hijacking [8].  That is the VPN set by the orgasaition is over taken by some other VPN connection from a remote client in order to use the information against the user. One of the other major problem is MAN in the Middle attack [17].  A fraudsters takes all the information form the VPN of the orgasaition and sells it in high price so that others can make use of it for the purpose of doing attacks in the orgasaition. The process of the user authentication is also one of the other major problem that have been seen in the terms of the security standards of the organization. Improper authentication leads to threats to the organization. Other than this the client side risk is also one of the major problem that is faced by many of the organization in order to maintain a proper security of the clients. Interoperability is one of the other major problem that is often faced by security experts setting up the VPN service. These are some of the major problems that are often faced by the organization in order to make these threats a least one.  The organization must make sure that there is no malware injection in the network of the orgasaition so that there is no VPN problem that is associated with the organization and hence reduce the chances to loss any information while using the VPN to be kept protected.
Conclusion:
Thus concluding the topic it can be said that the use of the VPN is one of the major step that must be taken in order to ensure extra security for any network May that be a personal network or be a organizational network. The VPN ensure that the network is safe from the foul players of the outside world so that there is no problem regarding the security of the organization. Further the expert that is setting up the security of the organizational VPN must ensure that some of the major points that are related to the security of the Virtual private networks must be ensured. Some of the major security threats are listed in the paper that must be taken a special care while setting up the VPN. It can be said that even if there is all the steps that are taken in order to ensure the security of the network then also there can be cases where there can security breach and can reduce the effect of the VPN.  Thus is must be said the virtual private network service must be used with under safe circumstances.
Future Works:
The history of the virtual private networks are very much interesting and the users of the VPN are expecting that with the rise of the technology the VPN services will also be increased. The orgasaition that are making the VPNs work are working on some of the major changes that can be made in order to ensure that the process of the VPN setup is more secured with time and hence it provides some of the other major changes in terms of the security if the devices [20]. The VPNs that will be coming in the future generation will have some of the major changes that will reduce the chances of any attacks that can be made using the VPN. Also the ongoing security problems that are faced by the organizations will be eradicated soon.
References:
[1]Bahnasse, Ayoub, and Najib El Kamoun. “Study and Analysis of a Dynamic Routing Protocols’ Scalability over a Dynamic Multi-point Virtual Private Network.” International Jour nal of Computer Applications 123, no. 2 (2015).
[2] Theodoro, Luiz Cláudio, Pedro Macedo Leite, Hélvio Pereira de Freitas, Adailson Carlos Souza Passos, Joao Henrique de Souza Pereira, Flávio de Oliveira Silva, Pedro Frosi Rosa, and Alexandre Cardoso. “Revisiting Virtual Private Network Service at Carrier Networks: Taking Advantage of Software Defined Networking and Network Function Virtualisation.” ICN 2015 (2015): 84.
[3] Lospoto, Gabriele, Massimo Rimondini, Benedetto Gabriele Vignoli, and Giuseppe Di Battista. “Rethinking virtual private networks in the software-defined era.” In Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium on, pp. 379-387. IEEE, 2015.
[4] Jyothi, K. Karuna, and B. Indira Reddy. “Study on Virtual Private Network (VPN), VPN’s Protocols And Security.” (2018).
[5] Moreno-Vozmediano, Rafael, Ruben S. Montero, Eduardo Huedo, and Ignacio M. Llorente. “Cross-site virtual network in cloud and fog computing.” IEEE Cloud Computing 2 (2017): 46-53.
[6] Choffnes, David. “A case for personal virtual networks.” In Proceedings of the 15th ACM Workshop on Hot Topics in Networks, pp. 8-14. ACM, 2016.
[7] Jangid, Manoj, and Prakriti Trivedi. “Improve Performance of Successive Ratio for Virtual Private Network.” In Computational Intelligence and Communication Networks (CICN), 2016 8th International Conference on, pp. 97-101. IEEE, 2016.
[8] Rosen, E., I. J. Wijnands, Y. Cai, and A. Boers. Multicast Virtual Private Network (MVPN): Using Bidirectional P-Tunnels. No. RFC 7582. 2015.
[9] Kim, Chang-Hun, Sang-Min Jung, and Sang-Kook Han. “All-optical virtual private network based on microwave photonic bandpass filter in ofdm-pon system.” In Transparent Optical Networks (ICTON), 2016 18th International Conference on, pp. 1-4. IEEE, 2016.
[10] Sinha, Sanjib. “Virtual Private Network or VPN.” In Beginning Ethical Hacking with Python, pp. 185-189. Apress, Berkeley, CA, 2017.
[11] Bhat, Anjum Zameer, Dalal Khalfan Al Shuaibi, and Ajay Vikram Singh. “Virtual private network as a service—A need for discrete cloud architecture.” In Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO), 2016 5th International Conference on, pp. 526-532. IEEE, 2016.
[12] Moradi, Ahmad, Andrea Lodi, and S. Mehdi Hashemi. “Virtual private network design over the first Chvátal closure.” RAIRO-Operations Research 49, no. 3 (2015): 569-588.
[13] Raeespour, Akram Kargar, and Ahmed Moosajee Patel. “Design and Evaluation of a Virtual Private Network Architecture for Collaborating Specialist Users.” Asia-Pacific Journal of Information Technology and Multimedia 5, no. 1 (2016).
[14] Liyanage, Madhusanka, Jude Okwuibe, Mika Ylianttila, and Andrei Gurtov. “Secure Virtual Private LAN Services: An Overview with Performance Evaluation.” In Communication Workshop (ICCW), 2015 IEEE International Conference on, pp. 2231-2237. IEEE, 2015.
[15] Feamster, Nick, Jennifer Rexford, and Ellen Zegura. “The road to SDN: an intellectual history of programmable networks.” ACM SIGCOMM Computer Communication Review 44, no. 2 (2014): 87-98.
[16] Skendzic, A., and B. Kovacic. “Open source system OpenVPN in a function of Virtual Private Network.” In IOP Conference Series: Materials Science and Engineering, vol. 200, no. 1, p. 012065. IOP Publishing, 2017.
[17] Chaitra, S., and Rinki Sharma. “Integration of Software Router with Wi-Fi for Enhanced Security.” In Advance Computing Conference (IACC), 2017 IEEE 7th International, pp. 33-36. IEEE, 2017.
[18] Han, Bo, Vijay Gopalakrishnan, Lusheng Ji, and Seungjoon Lee. “Network function virtualization: Challenges and opportunities for innovations.” IEEE Communications Magazine 53, no. 2 (2015): 90-97.
[19] Uskov, Alexander V. “Information security of IPsec-based mobile VPN: Authentication and encryption algorithms performance.” In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 1042-1048. IEEE, 2012.
[20] Rhodes-Ousley, Mark. Information security: the complete reference. McGraw Hill Education, 2013. 

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 13 pages

PAY 8 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). Virtual Private Networks For The Sensitive Data. Retrieved from https://myassignmenthelp.com/free-samples/mn610-virtual-private-networks/private-network.html.

“Virtual Private Networks For The Sensitive Data.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/mn610-virtual-private-networks/private-network.html.

My Assignment Help (2021) Virtual Private Networks For The Sensitive Data [Online]. Available from: https://myassignmenthelp.com/free-samples/mn610-virtual-private-networks/private-network.html[Accessed 18 December 2021].

My Assignment Help. ‘Virtual Private Networks For The Sensitive Data’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Virtual Private Networks For The Sensitive Data [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/mn610-virtual-private-networks/private-network.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

Many students find an annotated bibliography to be troubling. Adding to that, it takes a lot of time for listing out citations in articles, books and documents. If you have any query regarding how to write an annotated bibliography, feel free to contact MyAssignmenthelp.com. To make your job easier, we can help you understand the bibliography format thoroughly. We feel proud to announce that we have advanced level plagiarism software that will help to make your academic paper free of plagiarism.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »