Western Governors University Harvard Case Solution & Analysis

Summary

In this report, we attempt to discuss the process of the design, implementation and the current environment of the firewall VPN project that has been effective at Sunrise Inc. Firstly, we have reviewed and summed up the current work done by the other researchers and organizations in implementing such projects in their organizations and the simulated situations. The goals and the associated objectives of the project were to develop a firewall VPN that would connect Sunrise Inc. to the internet and allow its branches to overcome all sorts of business challenges, allowing for the sharing of information and firm resources remotely. This is depicted in appendix B. The second objective was to prevent false cyber security incidents within the organization. However, the latter has not been fully achieved and currently, network security has been enhanced and it is now more feasible to share the information and resources of the organization with remotely connected members of the organization.

Review of Other Work

Virtual Private Network or VPN for short, means many things to different people,however, for the sake of simplicity of this research report, we define VPN as a series of devices or network devices, which are used to interconnect branches in separate cities that are separated by the geographies(Bourque, 2017). It can also be used to connect remote users back to the home network and allow them to use the resources of the firm from remote locations(Agarwal, 2005).

In order to enable this functionality, the VPN makes use of the two interface network cards. One of the cards is connected to the intranet network of the organization and the other card is connected to the public network. All the staff members that are connected to the VPN network through the internet find a VPN firewall server and this allows them to connect to the corporate intranet(Bourdoucen, 2009).

Western Governors University Harvard Case Solution & Analysis

VPN is basically the use of encryption technology in which, it makes use of the common link for encapsulating data communication channels that transmit the data on the public internet. The main factors as reviewed in the other research studies on firewall VPN, that impact on the performance of this system are software, hardware, algorithm and the security services(Bourdoucen, 2009).

Many external studies have been performed on the impacting aspect of the firewall VPNs(CNBC, 2017). One of the research studies discussed the choice of the VPN technologies that are used and it also discussed the associated algorithm that impacted on the performance of the network. This study had proved that VPN protocols provide the firms with different performances for a different set of combinations of algorithms, protocols and operating systems(Fisli, 2005).

Another study depicted the use of different algorithms for the provisioning of the VPNs. It was concluded for this study that for even a simple scenario in which, the network links had been assumed to have links that are of an infinite capacity, the algorithm of the VPN and its computation does not have a necessary impact on the performance. Later on, an improved model had been introduced but the degradation still persisted(Narayan, 2009).....................

This is just a sample partical work. Please place the order on the website to get your own originally done case solution.

Share This

SALE SALE

Save Up To

30%

IN ONLINE CASE STUDY

FOR FREE CASES AND PROJECTS INCLUDING EXCITING DEALS PLEASE REGISTER YOURSELF !!

Register now and save up to 30%.