Research proposal: IPV6 Security issues and how to solve these issues.
https://ilokabenneth.blogspot.com/2014/01/research-proposal-ipv6-security-issues.html
Aurthor: Iloka Benneth Chiemelie
Publishesd: 1/6/2014
Description
of project
IPV6: Security issues and how to solve these issues.
Aims and
objectives
The new PIV6 has been well welcomed since inception
and adopted across the globe, but there have been little documentation on the
security issues associates with such Internet Protocol in relation to using
simple network equipment. The main issue with the new IPV6 is that the traffic
tunnel is easily enabled and this makes hacking easier in the sense that
hackers can bypass the network through the tunnel.
In view of that, the objective of this paper is to
develop a new approach to internet protocol whereby the IPV6’s tunnel is
enhanced in order to ensure that the easy of hacking is reduced and more
security accorded to uses of the next generation IP.
This issue can be solved by reconfiguration of the
system response unit, advancement of the IPV6 engine and development of new
systems that will act as defensive shield for IP related attached.
This paper is significant because the new development
will offer numerous advantages that will be used to solve the security issues
in the current system and help develop a more secured internet world.
Data source
for the project
Primary
data source – the primary
data will be sourced from application in companies across the world, in
relation to the possible issues that might have been experienced and documented
across nations. Additionally, there will be an interview with IT technicians to
understand their view about IPV6 and what they think are the associated
security issues.
Secondary
data sources – the secondary
data will be gathered through online journals and books about the IPV6, its
applications and security issues.
Methodology
This paper will adopt two methodologies in the form of
journal studies and interview with technicians. The method of the interview
will be based on reflective questionnaire to understand their perception and
views about the flaws in IPV6 connection and how it can be prevented.
Hardware
and software
The important hardware for this assignment is a PC.