StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Network and Internet Security - Essay Example

Cite this document
Summary
The paper "Network and Internet Security" highlights that protocols at the transport layer make certain that data discretion and integrity are due to the incidence of verification codes and a symmetric key. Additionally, it applies to both the communication remitted and the attachments…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Network and Internet Security
Read Text Preview

Extract of sample "Network and Internet Security"

? Network and Internet Security Part Session Keys A session key is a provisional method of encrypting data. Whena consumer initiates an information exchange session, a key for that precise session is generated. The key is applied for all communication throughout that phase. It is also eliminated when the session is over. Session keys are characteristically symmetrical and uncomplicated as concerns cryptography. This plainness would normally be a chief disadvantage of applying the key. However since several keys are utilized instantly and the keys aren’t utilized for long, it does not create much crisis (Carver, 2007). A Shared Secret is a provisional access code that a company needs to generate a Portal trade Account in the eManifest Portal. The CBSA offers it to businesses that demand contact to the Portal and must be applied within 90 days of the issue time. The Shared Secret comes in handy to substantiate and validate a customer when generating an eManifest Portal company Account. Only the CBSA and the certified representative of the business have contact to this information. The Kerberos protocol is planned to present steadfast verification over open and unprotected networks where communications linking the hosts belonging to it may tempered. Nevertheless, one should be aware that Kerberos does not grant any guarantees if the machines in use are susceptible: the validation servers, submission servers and customers must be kept continuously updated so that the legitimacy of the requesting users and suppliers can be guaranteed. Kerberos protocol endeavors to avert the client's password from being maintained in its unencrypted mode, even in the verification server database. Bearing in mind that every encryption algorithm applies its individual key length, it is apparent that, if the consumer is not to be required to use a diverse password of a preset size for each encryption technique supported, the encryption keys cannot be the passwords. For these bases the string2key application has been introduced. It transforms an unencrypted code word into an encryption key appropriate for the sort of encryption to be utilized. This function is referred every time a user alters code word or enters it for verification. The string2key is coined as a hash function, implying that it is permanent: given that an encryption key cannot establish the secret word which created it. One-time password verification scheme (OTP). The system offers authentication for system access and further applications entail authentication, which is sheltered against flaccid attacks based on rerunning held reusable passwords. OTP developed from the S/KEY: a brand name of Bellcore. The utilization of the OTP method only present buffers against replay aggression. It does not grant the seclusion of transmitted information, and neither does it guard against active attacks. Active aggression against TCP connections are identified to be there in the contemporary Internet (Kling, 1996). The triumph of the OTP system to guard host systems is reliant on the non-invertability of the protected hash functions applied (Carver, 2007). None of the hash algorithms have ever since been wrecked, but it is usually assumed that MD4 is less strong compared to MD5. If a server supports several hash algorithms, it is merely as protected as the weakest algorithm. There are two methods of productively and safely implementation of OTP tokens: structural design of the token execution and physical safety of the tokens. Regarding architecture, the first reflection is placement of the token in the system. The most secure application of OTP tokens is for logging in at workplaces locally or for reaching an internal network after a firewall. In an in-house network, whereby all servers are under watch (distinct from the open Internet) an MITM (Man in the Middle) assault is not as probable (Neuman, 2008). However SSL alone can't prevent a man-in-the-middle assault. SSL with joint authentication in place can offer some defense since both the server and consumer swap certificates, preventing the kind of server spoofing desirable for MITM attacks. Tokens are also susceptible to theft, which is why their material security is equally vital for safe implementation. If tokens are stolen on their way to customers beside the user's other login certificates, they're as good as compromised. A shared secret key is a cryptographic scheme that makes use of double keys: an open key recognized to everybody and a confidential or secret key identified merely to the receiver of the message. A significant constituent to the public key structure is that the public and private keys are linked in such a way that barely the public key can be applied to encrypt information and only the matching private key can be used to decrypt them. Furthermore, it is practically impractical to construe the private key despite knowing the public key. Public-key systems are exceedingly secure and fairly uncomplicated to apply. The only complexity with public-key systems is that one requires knowing the recipient's public key to encrypt information for them. The Kerberos protocol was considered to offer apparent access to all the connected resources a genuine user needed for a characteristic day once they log on their terminal. For instance, each time the consumer desires to salvage a file from a secluded server, the requisite authentication will betaken by Kerberos safely behind the view, with no consumer's involvement required. Authenticated public keys also called exponential key exchange, is a technique of digital encryption that makes use of numbers raised to explicit powers to generate decryption keys on the grounds of components that are never openly transmitted, rendering the possibility of a hacker mathematically infeasible The chief restraint of Diffie-Hellman in its essential form is that it does not work with verification. Information exchanges using Diffie-Hellman all by itself are susceptible to hackers. Preferably, Diffie-Hellman should be applied concurrently with an acknowledged authentication technique such as digital signatures to validate the identities of the consumers over the unobstructed communications medium. Diffie-Hellman is well apt for use in information communication except it is less often applied for data archived over long duration. Part 2: Group Discussion The application layer (layer 7) This is the level at which communication associates are recognized, value of service is known, consumer authentication and seclusion are considered, and any drawbacks on information syntax are identified. A case in point, in Java EE, constituent containers are accountable for offering 7-layer security. The application layer security offers protection services for a precise application category customized to the requirements of the application. At the application layer, function firewalls can be engaged to augment application protection by buffering the communication flow and all linked application resources from assault (Turoff, 2002). Safety is uniquely appropriate to the requirements of the application and is fine-grained, with application-specific settings. However, the application is reliant on security attributes that are not manageable between application types while Support for compound protocols makes this kind of security susceptible. Network layer (Layer3) The Network layer underscores the idea of routing on top of the Data Link layer. When information reaches at the Network layer, the basis and target addresses enclosed inside each framework are scrutinized to decide if the data has reached its ultimate target. If the data has reached the final goal, the Network layer formats the information into packets moved to the Transport layer. Or else, the Network layer renews the target address and moves the frame back downward to the lower layers. A chief benefit of this encryption is that it is not concerned with particulars of the information in transit. The end consumer cannot witness this encryption. Further, it does not meddle with other cryptographic protocols. On the negative side, consumers are unconscious of safety breaks which pressure negatively other users. Additionally, selective guard is not viable since the protocols are oblivious of the consumers’ entitlements and roles. Transport Layer The Transport layer guarantees the consistent arrival of communication and provides error inspection mechanisms and information stream controls. The Transport layer offers services for both "connection-mode" broadcast and for "connectionless-mode" communications. For connection-mode transmissions, a broadcast may be sent or received in the form of packets that require to be reconstructed into an absolute meaning at the other end. These protocols pledge the safety of communicating parties by application of certificates. Protocols at transport layer make certain that data discretion and integrity due to incidence of verification codes and symmetric key. Additionally, it applies to both the communication remitted and the attachments. On a negative note, the transport layer provides security only when information is on passage however not at the destinations. The protocols are too ignorant of message content consequently, selective protection is impracticable. References Carver, L.T.(2007). Human-computer interaction: the human and computer as a team in emergency management information systems. Communications of the ACM, 22(56),89-102. Kling, R.U.(1996). Computerization and controversy: value conflicts and social choices. Burlington: Morgan Kaufmann. Neuman,R.Y.(2008). Kerberos: An authentication service for computer networks. Communications Magazine 32 (9), 33-38. Turoff, M.Y.(2002). Past and future emergency response information systems. Communications of the ACM,11(67),34-68. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1496609-network-and-internet-security
(Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 Words)
Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1496609-network-and-internet-security.
“Network and Internet Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1496609-network-and-internet-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Network and Internet Security

Network Design Consultation

This piece will take into account the following: the recommended design that meets the customer's needs; an original diagram of the configuration; suggested network architecture and internet access configuration; recommended hardware; recommended software; a cost table; a basic recommended configuration; and a conclusion....  … Quality networked printer; file and folder sharing; Internet access; multiple email addresses; basic security environment (similar to home environment); initial investment $5,000 or less; and recurring costs less than $200 per month....
8 Pages (2000 words) Literature review

Network Security Fundamentals, Security Threats, and Issues

On the other hand, there is at the moment a great deal of suspicion on the subject of internet security, however an excellent information is that we have a wide variety of tools and technologies accessible which can ensure the maximum security of our network against illegal interruption (McConnell, 2004).... NETWORK security FUNDAMENTALS, security THREATS, AND ISSUES Network security Fundamentals, security Threats, and Issues Author Author's Affiliation Date 3....
4 Pages (1000 words) Case Study

Internet Security Issues

The paper "internet security Issues" discussed ethical issues of information systems connected on the Internet, session key protocols attacks and defense, simple distributed security infrastructure, group memberships & certificates, pros and cons of implementing cryptographic protocols, etc....
11 Pages (2750 words) Term Paper

A Wireless Network Structure Considering Security

This paper "A Wireless Network Structure Considering security" focuses on the fact that Wireless Networks are widely used both for individual or business purposes.... However, wireless networking has many security issues.... Agencies should be aware of the security risks associated with wireless technologies.... " It also provides "top 10 tips for wireless home network security".... hellip; PDA's give you the opportunity to access the internet, check your email....
9 Pages (2250 words) Coursework

Network Security

Consequently, internet security has become one of the most researched aspects of information technology.... This essay talks about network security.... hellip; According to the report for any given organization, network security involves the introduction of polices that would protect the available network to ensure unauthorized persons do not access or use the organizational information.... As the paper highlights network security guarantees authentication, availability, integrity and confidentiality is important to note that “network security is not absolute”....
10 Pages (2500 words) Research Paper

Chinese Government's Control of the Internet

This discussion, Chinese Government's Control of the internet, stresses that the People's Republic of China has a long-standing policy of information control in the sense that its government places tight constraints on the information it permits its citizens to have access to.... hellip; As the paper outlines, the Chinese government has managed to control its citizens access to certain websites through the auspices of internet filtering and/or censorship....
17 Pages (4250 words) Research Paper

The Great Firewall of China

internet security protection and management regulations.... The Chinese government's aim in regulation and control of the Internet is to restrict access to politically harmful information and to safeguard national security.... This research looks at the freedom of speech on internet and the Chinese approach to curb and filter the free flow of information.... As a case the internet situation in China has been discussed and the measures which the government has taken to filter out information thus negating the western concept of free flow of ideas, thoughts, beliefs and information in general (Einhorn & Keenan 2002)....
9 Pages (2250 words) Essay

Environmental Scanning Strategy of AlienVault

When it comes to Network and Internet Security, AlienVault has made a name for being one of the most trusted names in the security industry.... When it comes to Network and Internet Security, AlienVault has made a name for being one of the most trusted names in the security industry.... In addition, the firm as a technical division that deals with rolling out new and innovative technologies that constitute the company's Network and Internet Security products....
16 Pages (4000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us