Respond to both peer posts below by answering the following questions

Question(s):

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

In response to your peers, evaluate the analyses they have provided in their initial posts. Are there additional advantages or disadvantages to those addressed? Are there advantages or disadvantages to contradict those presented?

PEER POST # 1

The two items that I be discussing for VPN are security and reliability. Security is an important VPN topic to discuss because it is enabling a way to access internal network resources from untrusted external networks. The way that a VPN tunnel works is that traffic through the tunnel is encrypted in both endpoints ensuring that traffic sniffing is harder to do on external untrusted networks. Using a VPN would enable employees to securely work from any location if there is internet access from their location. This would fall under the integrity portion of the CIA triad.

The second point of discussion is reliability. There are many moving parts to have a VPN working correctly. At my work the user must have an AD account that is enabled for VPN access, a workstation on the domain with recent Windows and antivirus updates installed, and a physical DoD card that they have on them. If any of these fail then the user will not be able to use the VPN, and this does not include the networking equipment and endpoints that need to be functioning as well. This would fall under availability portion under the CIA triad.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

PEER POST # 2

Two key considerations for VPNs are security and mobility. Security advantages for VPNs include protecting confidentiality and integrity security principles. Using a VPN can prevent software, people, and web browsers from accessing your connection. This maintains the confidentiality and security of the data you send and receive. Hackers can intercept confidential data you submit on websites in several ways. They may attempt to pass for you using that information, which would give them access to credit card numbers, bank accounts, and other sensitive details. However, you can benefit from superior security, like an AES 256-bit encryption, when you use a VPN. This renders all your internet communications to anyone who manages to intercept them appear to be random, jumbled text and characters. However, VPNs do not 100% guarantee a non-hackable network and that can be seen in mobility drawbacks.

Mobility disadvantages for VPNs include loss of privacy and anonymity online. Your online anonymity cannot be guaranteed by even the finest VPNs. In ways that a VPN service cannot regulate, your online activity may potentially expose your real identity. Websites use cookies which can reveal specific information about you, like your name and location, even with the use of a VPN connection. The main benefit of using a VPN is that it prevents prying eyes from seeing what you conduct online. Even so, when you use a VPN to protect yourself, you are still giving your surfing history to an unidentified party—the VPN provider. Not to mention, using a VPN typically slows down connection speeds and the better performing one’s cost money. Another thing to consider is that VPNs will not protect your device entirely from malware or phishing attacks.

Still stressed with your coursework?
Get quality coursework help from an expert!