StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Networks and Security - Assignment Example

Cite this document
Summary
Networks & Security Customer Inserts His/Her Name Customer Inserts Grade Course Customer Inserts 17th April, 2012 Question 1 Confidentiality is the act of non-disclosure of information to unauthorized persons or individuals. A message is confidential when its contents are not disclosed to unauthorized persons…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Networks and Security
Read Text Preview

Extract of sample "Networks and Security"

Download file to see previous pages

On the other hand, it is not possible to have integrity existing without confidentiality. This is because the act of maintaining integrity concerns editing or changing the contents of data or a message. Therefore before integrity crime is committed then that person will have breached confidentiality (Cole, 2011). Since, he/she will have to be aware of the contents of the data or message. This occurs when the person involved is has access to the contents of the data or message either through authorization or not.

Question 2 The random nonce in an SSL handshake is so that an attacker cannot replay the sequence numbers used in encrypting data sent over a network. This mechanism is effective in ensuring security of the data sent is highly secured. Random nonces are very effective in protecting data sent over networks. For instance, when Bob sends a sequence of data to Alice, an intruder by the name of Tom sniffs the message and wants to extract the data. Tom will set up a TCP connection with Bob and send the same sequence of message.

Bob may think that Alice sent the same sequence of data (Lockhart, 2007). In this case, the solution would be for Bob to send different nonce for each connection. As a result, this will cause the encryption keys for the different days to be different. Random nonces are effective in providing adequate security especially when sending repeated messages over the same network. The main purpose of random nonce is to provide encryption and data security for messages or records. Question 3 An application gateway is a machine that is used in ensuring that used in proving relay services when there are different filters.

Filters in most cases block the transmission of certain classes of traffic. As a result, it is possible for gateways to prevent the traffic leading to huge networks problems or bottlenecks. Although gateways provide good security for networks they may hamper traffic leading to total collapse of the network. For instance, packet filtering gateways are used in filtering data from networks (Lockhart, 2007). They do so by dropping packets which might cause problems in the network. Therefore the best solution for the case whereby gateways re used is to include a router.

A router is used in routing traffic within the network and it is also utilized in connection to the internet. The advantage of a router is that it takes traffic and routes it to different machines in the network (Laet, 2005). Thus making use of a router with an application will be effective in keeping unwanted traffic out while at the same time improving efficiency in delivering data packets to different destinations. Question 4 The monoalphebetic cipher is one of the most secure data encryption methods that can be utilized in different scenarios.

The monoalphabetic cipher utilizes around 1026 pairings of data in ensuring that a message unencrypted. This method utilizes paring of letter to encrypt a message. For instance in encrypting the message “I am a student of MSc IT” would equal to: I=s, a=m, m=h, a=m, s=I, t=u, u=y, d=v, e=c, n=j, t=u, o=k, f=x, M=h, S=I, c=b, I=s, T=u. As a result, Plaintext (I am a student of MSc IT) is equal to Ciphertext (s mh miuyvcju kx hisu). While translating cipher text “s vkjkuuasjfik” would equal plaintext: S=i, v=d, k=o, j=n, k=o, u=t, u=t, a=h, s=I, j=n, f=k, i=s, k=o. As

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Networks and Security Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1448199-week
(Networks and Security Assignment Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1448199-week.
“Networks and Security Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1448199-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Networks and Security

Importance of Social Networking Security

This research is about the detailed analysis of In this research I will outline the main security threats that have emerged recently because of extensive web based environment.... This main focus of this research is to assess the social networking security.... These social networks offer us great advantage for all above mentioned tasks but also a great challenge for the personal privacy attacks and other type of security issues.... One thing can be concluded from the above discussion that there are security threats connected with social networking: data stealing and viruses are growing threats....
13 Pages (3250 words) Essay

Organizational Development in HRD Change Model

This is attributed to the fact that the business environment is becoming more dynamic and more competitive thus demanding for change for its further development.... Hope… The industry is subject to a variety of laws and regulations which include patenting, testing, ensuring, and efficacy, and lastly marketing of drugs....
4 Pages (1000 words) Research Paper

Linux or Windows: Which is More Secure

The author compares Windows and Linux security and states that the final decision does go towards Linux simply because they have proven themselves to be true while Microsoft Windows still has a long way to go before security can be a proven feature of the OS.... However, from a technical as well as a business standpoint, it is an important discussion, therefore, a comparison in terms of security for Windows and Linux is to be made in this report....
7 Pages (1750 words) Case Study

Computing: IT Centre Recommendations

The author of "Computing: IT Centre Recommendations" paper states that there are no easy decisions to make in setting up an IT centre for the company and the selection of computers in the IT centre will have a direct effect on the individuals who are going to be hired to work with the systems.... nbsp; … The software side also needs careful consideration as to the operating system, software requirements, and specialized applications which are needed by the company....
5 Pages (1250 words) Term Paper

Cellular Network and Smart Phone Application Security

The paper “Cellular Network and Smart Phone Application security” highlights the fact security is a prime requirement for users today and therefore users should be knowledgeable about their vulnerability to attacks.... Numerous applications present in smartphones have raised new security questions.... Users increased at a phenomenal rate and the concern for security and privacy became more intense.... Crackers and malicious users have become a great threat to security and are constantly trying to find loopholes within new secure systems....
7 Pages (1750 words) Case Study

Computer Networks and Security

This assignment "Computer Networks and Security" discusses the purpose of firewalls that is to act as an intermediary between the servers of the company and the outside community accessing the Internet.... While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers.... In addition, the concern is on the analysis of cost-benefits for application security alongside coming up with a rule set for the firewall ('IDS — the new firewall?...
11 Pages (2750 words) Assignment

The Effect of Cloud Computing on Enterprise Networks

Having to store their data in the cloud is not an advisable option since security concerns may arise in relation to the data stored there.... This paper ''the Effect of Cloud Computing on Enterprise networks'' focuses on one of the effects of applying cloud service in an organization; that is the effect of Cloud Computing on Enterprise networks.... This paper focuses on one of the effects of applying cloud service in an organization; that is the effect of Cloud Computing on Enterprise networks....
7 Pages (1750 words) Literature review

Effective Protect Computer Systems from Computer Viruses

Computer viruses are a security risk in cyberspace and they generate a sense of fear in the ability of unauthorized persons to enter into restricted virtual areas with ill intentions.... These are just but a few of the computer viruses which show how harmful they are to both security and productivity....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us