preview

Sunshine Machine Work

Decent Essays

Introduction As you requested, I have determined a solution for remote access to the Intranet file server. There were four areas of concern; (1) losing proprietary data, (2) preventing network break-ins, (3) assuring a secure remote connection. This report has recommendations for using a virtual private network and encryption protocols. The Problem Sunshine Machine Works has expanded its infrastructure. Its employees need remote access to the Intranet file server. The system implemented needs to have the following features: • Confidentiality – Establishing a secure connection to the Intranet file server. The network should not be easily hacked. Data should only be viewed by remote workers with the appropriate permissions. Using cryptography …show more content…

A VPN offers mobility and security for remote workers. The VPN uses an encrypted connection using the Internet. Remote workers wanting to use the Internet file server need authenticate their identity with a login id, password, RSA token, or smart card. The VPN can be used on company-owned laptops and personal electronic devices (PEDs). The VPN works by using data encapsulation. Encapsulating data packets into another set of data packets and data header this is the ‘tunnel’ used to send private data through the Internet. The data reaches its destination where the data is extracted from the 'tunnel'. It is then sent to the Application Layer where the remote worker can view or retrieve the files. This is a dedicated connection between the company and the remote worker computer. It is failsafe; the data sent through the VPN is encrypted by the sender and decrypted by the receiver. This prevents the data from being altered, read, or stolen by a hacker. Different cryptographic rules on each layer of the OSI model provide secure data transmission, authentication, confidentiality, and nonrepudiation. The cryptographic tunneling rules implemented for data security in each of the OSI layers (starting with the bottom layer) are listed …show more content…

It is the layer responsible for packet determination and IP addressing. At this layer, I recommend using IPSec. It can block and filter data received and sent to the Intranet file server based on IP address and port number. The web administrator can block traffic from all ports except port 80 (HTTP) and port 443 (HTTPS). A security policy needs to be added to the Active Directory to block traffic to the entire network. The security policy should only allow access to the Intranet file server. IPSec also protects the transport layer. It can be used with Kerberos to authenticate the client/server session. An IPSec certificate is used to verify the routers’ identity. IPSec provides encryption for data exchanges between the router and client machine. (Microsoft Developer Network,

Get Access