issc363 remote access risks discussion response

Need to respond to two student discussions with at least 150 words minimum for each response. Below in the bold are the questions the students are responding to.

Questions:

(1)Research the different types of VPNs and other relevant remote access applications

(2)Discuss what they are and some common techniques used to try and subvert their security.


Student one:

VPN’s has expanded many allowed many types of businesses to expand there hours and personnel.This development has been achieved by way use of various types of VPN’s.Client Based VPN’s use a layer 2 tunneling protocol along with IPSEC to provide a user with a secure tunnel in which to conduct their needs over a secure connection.The intention of a Client based VPN is to extend the corporate network but, in a user, friendly way which gives a user the feel of the corporate network.The user will be greeted with simple prompts in which they are required to enter a password to pass the authentication and grant access.This is the point that many VPN’s will perform simple checks which can check for proper versions of virus scans and system patches.This is where the initial check is done to decide whether to allo or deny access based on these criteria.A second type would ne network-based VPN’s.These VPN’s are for connecting trusted networks over a non-trusted network.This would be a scenario in which the untrusted network would be the internet in which as we all now is an area of computing that requires the most attention and security from.There are three that comprise the grouping of network based.The three are IP Sec Tunnels, Dynamic Multipoint VPN and MPLS based L3 VPNs.The most basic and easy to implement is the IP SEC Tunnel which can be setup on the most common routers that are in use.Dynamic Multipoint VPN takes the concept of IPSEC and combines it into a mesh model in which expands the entry point which a authenticated user can take to enter the network.The gives users a higher level of available authenticated networks in which to choose and remain connected on.MPLS or Multi Protocol Label switched network acts as a WAN connection but within the corporate network without the need of costly WAN line.

All software-based solutions are vulnerable to intrusions and security is tested and each moment while connected or attempting to connect.WEP is a simple protocol and one that when developed enhanced the entire computing experience but a with most advances there needs to be a balance created which disclosed the vulnerability to manipulate the WEP which was created for the 802.11 protocol. There are attacks that are designed to capture the traffic during transmission. This led to the development of WEP-2 which user strengthened AES (Advanced Encryption Standards) to protect sessions and client data.

References:

https://www.auvik.com/franklymsp/blog/types-vpns/

https://www.howtogeek.com/167783/htg-explains-the-…

-Anthony C

Student two:

VPN is a Virtual Private Network that allows a user to connect to a private network over the Internet securely and privately. VPN creates an encrypted connection, known as VPN tunnel, and all Internet traffic and communication is passed through this secure tunnel. Thus, keeping the user data secure and private. The Basic VPN types which are explained below.

Remote Access VPN

Remote access VPN allows a user to connect to a private network and access its services and resources remotely. The connection between the user and the private network happens through the Internet and the connection is secure and private. Remote Access VPN is useful for business users as well as home users.

A corporate employee, while traveling, uses a VPN to connect to his/her company’s private network and remotely access files and resources on the private network. Home users, or private users of VPN, primarily use VPN services to bypass regional restrictions on the Internet and access blocked websites. Users conscious of Internet security also use VPN services to enhance their Internet security and privacy.

Site-to-Site VPN

A Site-to-Site VPN is also called as Router-to-Router VPN and is mostly used in the corporates. Companies, with offices in different geographical locations, use Site-to-site VPN to connect the network of one office location to the network at another office location. When multiple offices of the same company are connected using Site-to-Site VPN type, it is called as Intranet based VPN. When companies use Site-to-site VPN type to connect to the office of another company, it is called as Extranet based VPN. Since Site-to-site VPN is based on Router-to-Router communication, in this VPN type one router acts as a VPN Client and another router as a VPN Server Technology Options: IPsec and SSL VPNs

There are two primary methods for deploying remote-access VPNs: IP Security (IPsec) and Secure Sockets Layer (SSL).

SSL-based VPNs provide remote-access connectivity from almost any Internet-enabled location using a Web browser and its native SSL encryption. SSL VPNs provide two different types of access: clientless and full network access. Clientless access requires no specialized VPN software on the user desktop.

IPsec-based VPNs are the deployment-proven remote-access technology used by most organizations today. IPsec VPN connections are established using pre-installed VPN client software on the user desktop, thus focusing it primarily on company-managed desktops. IPsec is a widely deployed technology that is well-understood by end users and has established IT deployment support processes.

VPNs and some common techniques used to subvert VPN Security are based on different VPN security protocols. Each of these VPN protocols offer different features and levels of security. Internet Protocol Security or IPsec: Internet Protocol Security or IPsec is used to secure Internet communication across an IP network. Layer 2 Tunneling Protocol (L2TP): L2TP or Layer 2 Tunneling Protocol is a tunneling protocol that is usually combined with another VPN security protocol like IPsec to create a highly secure VPN connection Secure Sockets Layer (SSL) and Transport Layer Security (TLS): SSL (Secure Sockets Layer) and TLS (Transport Layer Security) create a VPN connection where the web browser acts as the client and user access is restricted to specific applications instead of entire network. Secure Shell (SSH): Secure Shell or SSH creates the VPN tunnel through which the data transfer happens and also ensures that the tunnel is encrypted. OpenVPN: is an open source VPN that is useful for creating Point-to-Point and Site-to-Site connections. It uses a custom security protocol based on SSL and TLS protocol.

Reference

“Types of VPN and Types of VPN Protocols.” VPN One Click, www.vpnoneclick.com/types-of-vpn-and-types-of-vpn-protocols/.

“Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations.” Cisco, 2 Aug. 2017, www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/prod_white_paper0900aecd804fb79a.html.

-Dam

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.