BlogNewsJustify use of VPN for secure communication

February 17, 2022by Dataman0

Hits: 0

Justify use of VPN for secure communication

 

With so many employees having to work remotely, companies are turning to technologies like virtual private networks (VPNs) to keep their communications secure. VPN use has grown significantly but there are viable alternatives.

  • Select three alternatives or VPN add-on platforms/solutions for an enterprise organization.
  • Describe the pros and cons of each alternative, including VPNs.
  • Describe an actual organization for which each of your selections, and a VPN, would be the best solution and justify why.

 

Question 2:

For this discussion, imagine yourself as the CIO of an engineering and software development company that has federal, military, and civilian customers. You must ensure that all your company’s information, as well as data exchanged with your customers, is properly encrypted using known, accepted standards.

  • Select a standard, such as NIST, ANSI, IEEE, IETF or ISO, for your company.
  • Describe the standard, its pros and cons, and justify your selection.
  • Discuss whether you would communicate with your customers using an asymmetric or symmetric algorithm, and why, and rationalize the type of algorithm you would use, such as RSA or DES.

Justify use of VPN for secure communication

Question 3:

When designing a new application or software product that entails access control, security should be embedded throughout its development.

  • Compare the software development life cycle to the security development life cycle and describe how each is used to enable testing and how they differ from each other.
  • Search the Internet and find and describe at least two tools to assist with the software development and security life cycles and discuss the pros and cons of each tool.

Questions (KW7-9)

Question 1:

With so many employees having to work remotely, companies are turning to technologies like virtual private networks (VPNs) to keep their communications secure. VPN use has grown significantly but there are viable alternatives.

  • Select three alternatives or VPN add-on platforms/solutions for an enterprise organization.
  • Describe the pros and cons of each alternative, including VPNs.
  • Describe an actual organization for which each of your selections, and a VPN, would be the best solution and justify why.

 

Question 2:

For this discussion, imagine yourself as the CIO of an engineering and software development company that has federal, military, and civilian customers. You must ensure that all your company’s information, as well as data exchanged with your customers, is properly encrypted using known, accepted standards.

  • Select a standard, such as NIST, ANSI, IEEE, IETF or ISO, for your company.
  • Describe the standard, its pros and cons, and justify your selection.
  • Discuss whether you would communicate with your customers using an asymmetric or symmetric algorithm, and why, and rationalize the type of algorithm you would use, such as RSA or DES.

 

Question 3:

When designing a new application or software product that entails access control, security should be embedded throughout its development.

  • Compare the software development life cycle to the security development life cycle and describe how each is used to enable testing and how they differ from each other.
  • Search the Internet and find and describe at least two tools to assist with the software development and security life cycles and discuss the pros and cons of each tool.

Justify use of VPN for secure communication

Leave a Reply

Your email address will not be published. Required fields are marked *