You Decide,Scenario, Your Role, Key Players, computer science homework help

User Generated

yt5050

Computer Science

Description

Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to provide technical guidance and leadership on this issue.

Follow the instructions provided in the You Decide Exercise: Cryptographic Tunneling and the OSI Model.

  • Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.
  • Review the OSI Simulation in the week 3 lecture.
  • Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) which may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).

Here are the screenshot of the Scenarios. Thanks!!

http://prntscr.com/fkpnl5--Scenario

http://prntscr.com/fkpnr1---Role

http://prntscr.com/fkpo2b--Player 1

http://prntscr.com/fkpo6y----Player 2

http://prntscr.com/fkpoc7---Player 3

http://prntscr.com/fkpoio----Deliverable

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, I'm done with your task, all parts are well and clearly illustrated as per your respective instructions.Thanks.

Running head: COMPUTER SCIENCE

1

Computer Science
Name of Student
Name of Professor
Course Title
Date

COMPUTER SCIENCE

2

Introduction
Intranet is termed as a facility which help organizations to securely share information
transition through secure network connectivity among all employees. Company is seeking for
facility that connect its employees to company's network and they should be able to access
company's information through secure network connection and this connection should support
data protection and remote information accessibility through secure network ports (Chapman,
2000).
Role of OSI Model
Network accessibility requires an authentication that should maintain network
resources through controlled Authentication mechanism set-up. This authentication
mechanism support Authentication, Authorization, and Accounting (AAA) services and ensure
to secure data transition over...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags