Data Systems > ASSIGNMENT > SEC 360 Week 5 YouDecide Assignment: Cryptographic Tunneling and the OSI Model (All)
SEC 360 Week 5 YouDecide Assignment: Cryptographic Tunneling and the OSI Model The Sunshine Machine Works company has recently expanded its infrastructure and has task the IT s... ervice manager to develop a plan and approach for remote access. One of the main concerns is the fear of the remote access being compromised and the propriety information or the customer’s data leaked. It is very important for all employees to be able to be able to the company’s intranet remotely and securely. One of the best approaches would be to create a VPN for remote access. Network and cryptography protocols should help management understand that remote access to the intranet is safe and secure if security procedures are used. To understand the concept remote access, we will need to discuss the OSI model and Cryptographic tunneling protocols. The OSI Model defines a networking framework to implement protocols in seven layers. The layers are as follows application, presentation, session, transport, network, data link and physical layers. The layers that are important to the companies need for secure data transport and remote access are the data link, network, transport, and application layers . In the data link layer data packets are encoded and decoded into bits. The Data link layer establishes and terminates the logical link between nodes. The data link layer contains two sublayers the Media Access Control (MAC) and Logical Link Control (LLC). Every computer has its own unique MAC address. The LCL layer manages traffic over the physical medium. The LCL layer also classifies line protocols like NetBIOS, Netware and SDLC and may also assigns sequence numbers to frames and track acknowledgements. The network layer addresses routing, datagram encapsulation, routing, fragmentation and assembly, and error handling and diagnostics. The data link layer defines the boundaries of a network, the network layer is the one that defines how the internetwork functions. The transport layer creates and maintains the connection between computers or devices through the use of transmission control (TCP) and user datagram protocol (UDP) protocols. The application layer is the most important for remote access of networks. The application layer provides users remote file and printer access, network management, directory services, email and network virtual terminals. Protocols for the application layer include DND, TFTP, SSL, FTP, HTTP, STMP, SSH Telnet and RTP. Two of the key protocols for security are Telnet and SSH. Secure Shell (SSH) provides secure transmission of data over an unsecured network through the uses a public key cryptography to authenticate the remote computer and allow it to authenticate the user. SSH encrypts the data packets being transferred between the systems and secures it from being decrypted by unauthorized persons. “Telnet is a terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network.” Telnet used for remote management and for the initial setup for some network devices. Cryptographic Tunneling Protocols such as VPN uses point to point tunneling protocol (PPTP) to communicate to private networks through private secure tunnels of the public internet. Tunneling protocols encapsulate data packets in the IP packets. Cryptographic tunneling assigns a key to the data that is sent and thus requires authentication before the data or message can be accessed. The L2TP (layer 2) tunneling protocol is also used by internet service providers to allow VPNs to operate over the internet. Microsoft uses PPTP while Cisco systems use L2F, these together make up L2TP. L2TP does not provide any encryption by itself, it relies on Internet Protocol security (IPsec) in Transport Mode for encryption services. The company requires that its employees be able to remotely and securely access the company’s server via the internet. The company’s administration has voiced its concerns over the issue and has tasked the IT department to come up a solution. I good VPN with excellent cryptographic tunneling is a good choice to provide good, privacy, security and protection of the company’s data while the employees are working remotely. Sunshine Machine Works needs to develop a good remote security policy and make sure all employees are trained properly before allowing remote access to the network. Windows Server (n.d), VPN Tunneling Protocols, Retrieved from https://technet.microsoft.com/en-us/library/cc771298(v=ws.10).aspx How Stuff Works (n.d) How VPNs Work Retrieved from http://computer.howstuffworks.com/vpn7.htm http://www.webopedia.com/TERM/T/Telnet.html [Show More]
Last updated: 1 year ago
Preview 1 out of 5 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 04, 2023
Number of pages
5
Written in
This document has been written for:
Uploaded
Jul 04, 2023
Downloads
0
Views
66
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·