Retrieved from https://studentshare.org/information-technology/1448199-week
https://studentshare.org/information-technology/1448199-week.
On the other hand, it is not possible to have integrity existing without confidentiality. This is because the act of maintaining integrity concerns editing or changing the contents of data or a message. Therefore before integrity crime is committed then that person will have breached confidentiality (Cole, 2011). Since, he/she will have to be aware of the contents of the data or message. This occurs when the person involved is has access to the contents of the data or message either through authorization or not.
Question 2 The random nonce in an SSL handshake is so that an attacker cannot replay the sequence numbers used in encrypting data sent over a network. This mechanism is effective in ensuring security of the data sent is highly secured. Random nonces are very effective in protecting data sent over networks. For instance, when Bob sends a sequence of data to Alice, an intruder by the name of Tom sniffs the message and wants to extract the data. Tom will set up a TCP connection with Bob and send the same sequence of message.
Bob may think that Alice sent the same sequence of data (Lockhart, 2007). In this case, the solution would be for Bob to send different nonce for each connection. As a result, this will cause the encryption keys for the different days to be different. Random nonces are effective in providing adequate security especially when sending repeated messages over the same network. The main purpose of random nonce is to provide encryption and data security for messages or records. Question 3 An application gateway is a machine that is used in ensuring that used in proving relay services when there are different filters.
Filters in most cases block the transmission of certain classes of traffic. As a result, it is possible for gateways to prevent the traffic leading to huge networks problems or bottlenecks. Although gateways provide good security for networks they may hamper traffic leading to total collapse of the network. For instance, packet filtering gateways are used in filtering data from networks (Lockhart, 2007). They do so by dropping packets which might cause problems in the network. Therefore the best solution for the case whereby gateways re used is to include a router.
A router is used in routing traffic within the network and it is also utilized in connection to the internet. The advantage of a router is that it takes traffic and routes it to different machines in the network (Laet, 2005). Thus making use of a router with an application will be effective in keeping unwanted traffic out while at the same time improving efficiency in delivering data packets to different destinations. Question 4 The monoalphebetic cipher is one of the most secure data encryption methods that can be utilized in different scenarios.
The monoalphabetic cipher utilizes around 1026 pairings of data in ensuring that a message unencrypted. This method utilizes paring of letter to encrypt a message. For instance in encrypting the message “I am a student of MSc IT” would equal to: I=s, a=m, m=h, a=m, s=I, t=u, u=y, d=v, e=c, n=j, t=u, o=k, f=x, M=h, S=I, c=b, I=s, T=u. As a result, Plaintext (I am a student of MSc IT) is equal to Ciphertext (s mh miuyvcju kx hisu). While translating cipher text “s vkjkuuasjfik” would equal plaintext: S=i, v=d, k=o, j=n, k=o, u=t, u=t, a=h, s=I, j=n, f=k, i=s, k=o. As
...Download file to see next pages Read More