Data Systems > ASSIGNMENT > SEC 360 Week 5 YouDecide Assignment: Cryptographic Tunneling and the OSI Model (All)

SEC 360 Week 5 YouDecide Assignment: Cryptographic Tunneling and the OSI Model

Document Content and Description Below

SEC 360 Week 5 YouDecide Assignment: Cryptographic Tunneling and the OSI Model The Sunshine Machine Works company has recently expanded its infrastructure and has task the IT s... ervice manager to develop a plan and approach for remote access. One of the main concerns is the fear of the remote access being compromised and the propriety information or the customer’s data leaked. It is very important for all employees to be able to be able to the company’s intranet remotely and securely. One of the best approaches would be to create a VPN for remote access. Network and cryptography protocols should help management understand that remote access to the intranet is safe and secure if security procedures are used. To understand the concept remote access, we will need to discuss the OSI model and Cryptographic tunneling protocols. The OSI Model defines a networking framework to implement protocols in seven layers. The layers are as follows application, presentation, session, transport, network, data link and physical layers. The layers that are important to the companies need for secure data transport and remote access are the data link, network, transport, and application layers . In the data link layer data packets are encoded and decoded into bits. The Data link layer establishes and terminates the logical link between nodes. The data link layer contains two sublayers the Media Access Control (MAC) and Logical Link Control (LLC). Every computer has its own unique MAC address. The LCL layer manages traffic over the physical medium. The LCL layer also classifies line protocols like NetBIOS, Netware and SDLC and may also assigns sequence numbers to frames and track acknowledgements. The network layer addresses routing, datagram encapsulation, routing, fragmentation and assembly, and error handling and diagnostics. The data link layer defines the boundaries of a network, the network layer is the one that defines how the internetwork functions. The transport layer creates and maintains the connection between computers or devices through the use of transmission control (TCP) and user datagram protocol (UDP) protocols. The application layer is the most important for remote access of networks. The application layer provides users remote file and printer access, network management, directory services, email and network virtual terminals. Protocols for the application layer include DND, TFTP, SSL, FTP, HTTP, STMP, SSH Telnet and RTP. Two of the key protocols for security are Telnet and SSH. Secure Shell (SSH) provides secure transmission of data over an unsecured network through the uses a public key cryptography to authenticate the remote computer and allow it to authenticate the user. SSH encrypts the data packets being transferred between the systems and secures it from being decrypted by unauthorized persons. “Telnet is a terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network.” Telnet used for remote management and for the initial setup for some network devices. Cryptographic Tunneling Protocols such as VPN uses point to point tunneling protocol (PPTP) to communicate to private networks through private secure tunnels of the public internet. Tunneling protocols encapsulate data packets in the IP packets. Cryptographic tunneling assigns a key to the data that is sent and thus requires authentication before the data or message can be accessed. The L2TP (layer 2) tunneling protocol is also used by internet service providers to allow VPNs to operate over the internet. Microsoft uses PPTP while Cisco systems use L2F, these together make up L2TP. L2TP does not provide any encryption by itself, it relies on Internet Protocol security (IPsec) in Transport Mode for encryption services. The company requires that its employees be able to remotely and securely access the company’s server via the internet. The company’s administration has voiced its concerns over the issue and has tasked the IT department to come up a solution. I good VPN with excellent cryptographic tunneling is a good choice to provide good, privacy, security and protection of the company’s data while the employees are working remotely. Sunshine Machine Works needs to develop a good remote security policy and make sure all employees are trained properly before allowing remote access to the network. Windows Server (n.d), VPN Tunneling Protocols, Retrieved from https://technet.microsoft.com/en-us/library/cc771298(v=ws.10).aspx How Stuff Works (n.d) How VPNs Work Retrieved from http://computer.howstuffworks.com/vpn7.htm http://www.webopedia.com/TERM/T/Telnet.html [Show More]

Last updated: 1 year ago

Preview 1 out of 5 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$8.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

66
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 04, 2023

Number of pages

5

Written in

Seller


seller-icon
Doc.Mukai Edyth

Member since 2 years

0 Documents Sold

Additional information

This document has been written for:

Uploaded

Jul 04, 2023

Downloads

 0

Views

 66

More From Doc.Mukai Edyth

View all Doc.Mukai Edyth's documents »

$8.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·