Tuesday, April 30, 2019
Networks and Security Assignment Example | Topics and Well Written Essays - 750 words
Networks and Security - identification ExampleOn the other hand, it is not possible to have legality existing without confidentiality. This is be understanding the act of maintaining oneness concerns editing or changing the contents of info or a message. Therefore before integrity crime is committed then that person allow have breached confidentiality (Cole, 2011). Since, he/she will have to be aware of the contents of the data or message. This occurs when the person involved is has access to the contents of the data or message either through authorization or not. Question 2 The random nonce in an SSL handshake is so that an attacker cannot replay the sequence numbers used in autographing data move over a network. This mechanism is effective in ensuring security of the data sent is highly secured. ergodic nonces are very effective in protecting data sent over networks. For instance, when dock sends a sequence of data to Alice, an intruder by the name of Tom sniffs the messag e and wants to extract the data. Tom will set up a TCP connection with bobtail and send the same sequence of message. Bob may think that Alice sent the same sequence of data (Lockhart, 2007). In this case, the solution would be for Bob to send diverse nonce for each connection. As a result, this will cause the encryption keys for the dissimilar days to be different. Random nonces are effective in providing adequate security especially when send repeated messages over the same network. The main purpose of random nonce is to provide encryption and data security for messages or records. Question 3 An screening gateway is a machine that is used in ensuring that used in proving relay services when there are different filters. Filters in most cases parry the transmission of certain classes of traffic. As a result, it is possible for gateways to prevent the traffic leading to huge networks problems or bottlenecks. Although gateways provide good security for networks they may hamper tr affic leading to total collapse of the network. For instance, piece of ground filtering gateways are used in filtering data from networks (Lockhart, 2007). They do so by dropping packets which might cause problems in the network. Therefore the best solution for the case whereby gateways re used is to include a router. A router is used in routing traffic within the network and it is also utilized in connection to the internet. The proceeds of a router is that it takes traffic and routes it to different machines in the network (Laet, 2005). Thus making use of a router with an application will be effective in keeping unwanted traffic out while at the same time improving efficiency in delivering data packets to different destinations. Question 4 The monoalphebetic think is one of the most secure data encryption methods that can be utilized in different scenarios. The monoalphabetic cipher utilizes around 1026 pairings of data in ensuring that a message unencrypted. This method utiliz es paring of letter to encrypt a message. For instance in encrypting the message I am a student of MSc IT would embody to I=s, a=m, m=h, a=m, s=I, t=u, u=y, d=v, e=c, n=j, t=u, o=k, f=x, M=h, S=I, c=b, I=s, T=u. As a result, Plaintext (I am a student of MSc IT) is equalize to Ciphertext (s mh miuyvcju kx hisu). While translating cipher text s vkjkuuasjfik would equal plaintext S=i, v=d, k=o, j=n, k=o, u=t, u=t, a=h, s=I, j=n, f=k, i=s, k=o. As
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.