who won the cold war us vs soviet union

Between 1945 and 1989 world affairs were dominated by the so called Cold War between the United States and the Soviet Union.  In end, the Soviet Union is considered to have come out on the losing end of the conflict, however, some have begun to question whether the Cold War actually had an ultimate winner and loser.  Who do you believe won the Cold War?

General Guidelines

Your paper should by typed, double-spaced, and in a font of similar size to that used in these guidelines (12 pt).  It should be no less than FOUR (4) and no more than SIX (6) pages of text (not including the work cited page) in length.

II.    Some Things to Consider

1.    Your goal in writing this paper is to take a side on the issue of foreign policy, thus you will be arguing a point throughout your paper.
2.    You will not be graded on you opinion, but rather how well you argue your point.
3.    Make sure you take time in your paper to not only flesh out your own opinion but also address counterarguments.
4.    Arguments are always made stronger when authors cite creditable external sources to bolster their claims.

Then on a separate works cited page:

Donald, David. Review of Russell Weigleys Age of Battles. American Historical Review. (Vol. 106, No.4) May 2005.

In other words:  When in doubt. Cite!!

Cybersecurity Price negotiable

Task 1 1000 to 1400 words

You are required to write a report for T1 Electros Chief Information Officer, the report should contain the following sections:

    Explain in your own words what a VPN is and in general terms how they work.

    Research the various VPN technologies that could be used to secure a site-to-site connection. Compare and contrast these VPN technologies looking at speed, ease of configuration and security. Hint: PPTP, L2TP and IPSec are the main types to focus on.

    VPNs make use of symmetric and asymmetric encryption for critical phases of their operation. Explain using clear, concise and technically accurate descriptions the difference between symmetric and asymmetric encryption. Explain which phase of the VPN establishment uses symmetric encryption and which phase use asymmetric encryption and crucially why VPNs operate this way. Ensure that you provide an example of each form of encryption, these should be the same as the encryption algorithms you used in your Site-to-Site VPN in task 2.

Task 2

Implement an IPSec Site-to-Site VPN between the main site edge router and the server farm edge router. Company policy dictates that this network requirement should be designed, implemented and tested in an advanced network simulation application before it is rolled out on the live network. You should use the prototype you configured in assignment 1 of WAN Protocols and Cybersecurity as the starting point for the new prototype.

Make use of Cisco Packet Tracer, in order to demonstrate how the new network structure will work. A physical topology of the network has been provided below. The additional IP addressing for the Site-to-Site VPN is completely your responsibility.

Add a section to your report that uses commented screenshots to describe the configuration and testing of the Site-to-Site VPN. – 400 to 600 words.

Requirements:

    You will need to configure the network according to the proposed design. The network will be tested using functionality testing. Your tutor will ping and trace across various paths, they will also use Cisco show commands to verify the correct operation of the Site-to-Site VPN. Again, this will require good research skills and some experimentation using Packet Tracer to configure successfully.

Any topic (writer’s choice)

Using the definitions of Aware, Semi-Aware, Hidden, provide a description of the type of activities that would employ particular persons who would be involved with these terminology as they relate to military, intelligence activities and terrorism. Explain why you think they would be using these specific skills. Why you associate the type of individual to what activity and also what you do to counter any potential threat stemming from this activity.

Cybersecurity

Requirements:

    You will need to study the network diagram on the previous page in order to understand and interpret the physical topology. This physical topology has not been created by you, so you will need to ask questions in order to fully understand what is required from you. A list of meaningful questions will need to be written and submitted with the written part of the assignment. The questions will be answered in a 15-minutes one-to-one meeting with the client representative (your tutor).

    You will need to configure the network according to the proposed design. The network will be tested using functionality testing. Your tutor will ping and trace across various paths, they will also use Cisco show commands to verify the correct operation of PPP, eBGP and the remote access VPN. This last task is quite a challenging configuration that makes use of AAA, encryption and hashing technologies and will require good research skills and some experimentation using Packet Tracer to configure successfully.

    You need to provide a report of 1200-1600 words where you show:

o    A list of meaningful questions that you prepared for the meeting with the client in order to clarify the requirements and a rationale showing your understanding and interpretation of the requirements. Your questions should demonstrate an understanding of the technical requirements that should be considered in order to implement the technologies you will be configuring. Five questions should be asked and each question can receive a maximum of two marks, therefore a total of ten marks can be achieved for the questions.

o    A detailed IP addressing scheme for the new additions to the T1 Electro network that is carefully and clearly explained.

o    An explanation of router configurations required to meet the customer requirements and commented screenshots of testing the connections on Packet Tracer Simulator command line option. Ensure that you include a screenshot of the remote access VPN in its fully connected state, this can be achieved by using ipconfig on the remote workers PC and an appropriate Cisco CLI show command(s) on the R3 router.
For reporting on router configuration, just copying and pasting some commands is not enough. The syntax of the commands can change from one platform to another and from one manufacturer to another, it is the process that needs to be explained. You will be using Cisco router commands to explain configuration steps that can otherwise be done on any other types of routers but just with different syntax. As you will need to do some research of BGP, PPP and RA VPNs, you need to use Harvard referencing to cite your sources.