Assignment 6 IT4070

docx

School

Capella University *

*We aren’t endorsed by this school

Course

4070

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by CommodorePenguin2708

Report
Assignment Template Learner Name: Janie Craig Lab Screenshots and Narrative Insert and title all lab screenshots in the order they were taken. Briefly describe what you learned or observed in the lab below each screenshot. Be specific. [Screenshot section 1 part 1 step 10 [Screenshot section 1 part 1 step 16 1
Assignment 6 IT4070 [Screenshot section 1 part 2 step 4 To: Charlie Roberts <croberts@beingattacked.com> From: Susan Dougherty <susand@innocentbystander.com> Date: 11/11/2023 Subject: A favor? Dear Charlie, I am the chairperson of the Cure Stange Society, our goal is to reach $500,000, and with your help, we can do this. Please click here to make a donation today! Thanks, Susan Dougherty Chairperson [Screenshot section 2 part 1 step 24 2
Assignment 6 IT4070 Screenshot section 2 part 38 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Assignment 6 IT4070 Assignment Layer 2 tunneling (L2TP) is one of the secure VPN protocols that one can use that can enable workers offsite to access data that is within the organization's offices. This can secure data transfers but some organizations may have issues with the firewall and this is not the best for a healthcare system. It may just reroute the data instead of better protecting the health system data. This VPN protocol may be more slow once encryption is used. A second protocol would be the Secure socket layer-based tunneling (SSL). This can be used without special additional software. While the SSL protocol is easy to use and more secure than a traditional VPN, it is slower and may not work with all web browsers. Lastly, another VPN protocol would be an Open VPN. It has better security than others and has stronger encryption abilities. This option also has a slower speed and may require a third party to use it. Open VPN can deliver and bypass most firewalls and can be considered the most secure VPN tunneling protocol. A remote hacker can bypass authentication which can lead to leaks within the system. 4
Assignment 6 IT4070 VPN can reduce the risks of data breaches and mask a healthcare worker's IP address. A VPN must meet HIPPA's security compliance requirements. The VPN must require users to authenticate who they are and must require all data to be encrypted in transit and when at rest. VPNs for healthcare need to be able to transfer patients, vendors, or the organization's data for little to no risk at all. The correct VPN can assist in keeping the organization HIPPA compliant. Using OpenVPN to ensure security and privacy encryption must be used on this. It has speed, security, and good reliability. OpenVPN does not keep track of records either so this Is great for making sure patients, vendors, or organizations are put at risk. This option can assist in keeping Anchor Hospital more secure and HIPPA compliant. OpenVPN uses SSL/TLS for a key exchange. 5