WEEK 8 ASSIGNMENT

docx

School

Strayer University, Washington *

*We aren’t endorsed by this school

Course

505

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by DeanBatMaster862

Report
Name: Tolulope Lawal Course Title: CIS 505 Instructor’s Name: Dr. Mark Cohen Title of Assignment: IPsec, SLL/TLS Standards, and VPN Security Date: 05/29/2023
Remote access, intranet-based, and extranet-based VPNs are the three different types of VPNs. Remote entry users of VPNs can access a private network from a distance. Telecommuters, mobile employees, and home users who require access to their workplace network from locations other than the office frequently utilize this form of VPN. VPNs based on the intranet link two or more offices of the same business together. This kind of VPN is frequently used to link branch offices together or to link a location to a centralized server. VPNs based on extranets link two or more businesses together. This kind of VPN is frequently used to link up business partners or to link up a corporation with its suppliers . The benefits and drawbacks of every form of VPN are different. However, they are also the least secure. Remote access VPNs are the simplest to set up and use. The security of intranet-based VPNs is higher than that of remote access VPNs, but their setup and use are more challenging. Despite being the most secure, extranet-based VPNs are also the most challenging to set up and use. Standards for Security SSL/TLS and IPsec are two distinct Internet security technologies. Over the Internet, communications are encrypted and authenticated using the security protocol known as IPsec. Internet communications are encrypted using the security protocol SSL/TLS. VPNs are implemented using both SSL/TLS and IPsec. Compared to SSL/TLS, IPsec has a lot of advantages. In the first place, IPsec is safer than SSL/TLS. This is due to IPsec's use of more powerful encryption methods and its authentication of both the data sender and recipient. Additionally, IPsec is more adaptable than SSL/TLS. This is because multiplexing, ATM, and Frame Relay are only a few of the communication technologies that IPsec can be utilized with. Third, IPsec is more straightforward to set up than SSL/TLS. This is because IPsec is a standards-based protocol and is supported by a wide range of vendors. Compared to IPsec, SSL/TLS offers several benefits. First, SSL/TLS is more frequently used than IPsec. This is because SSL/TLS is the industry-standard security protocol for the World Wide Web and is compatible with all the main web browsers. Second, compared to IPsec, SSL/TLS is more user-friendly. This is since SSL/TLS is intended to be transparent to the user and doesn't call for any specialized hardware or software. Third, SSL/TLS is more effective than IPsec. This is so because SSL/TLS uses a single connection for both encryption and
authentication, whereas IPsec needs two connections—one for encryption and the other for authentication. Evaluation SSL/TLS-based extranet-based VPN: For an extranet-based VPN, I would recommend utilizing SSL/TLS. This is due to the fact that SSL/TLS is more commonly used than IPsec and is also more effective. VPN for remote access: IPsec For a remote access VPN, I recommend utilizing IPsec. This is so that IPsec may be implemented more easily than SSL/TLS and be more secure than SSL/TLS. VPN for intranets using IPsec. I recommend utilizing IPsec as the VPN protocol for an intranet. This is so that IPsec, which is more versatile than SSL/TLS and more secure than SSL/TLS, can be used. Reflection This assignment was difficult but instructive, in my opinion. I appreciated learning about the various VPN configurations and the various security measures that may be utilized to implement them. I gained knowledge of the various VPN configurations and the range of security measures that may be applied to them. Additionally, I gained knowledge of the positives and negatives associated with each VPN kind and security standard. If I ever need to set up a VPN, I could apply this experience in my own life. Since I'm interested in working in the sector of information security, it would also be helpful to me professionally.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
References https://searchsecurity.techtarget.com/tip/VPN-security-standards-and-protocols-IPSec-vs-SSL- TLS https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/SAFE_RG/Chap4.html#wp 1030696 https://www.techrepublic.com/article/vpn-types-remote-access-intranet-based-and-extranet- based-vpn/