Free

Questions in Network Security - Coursework Example

Comments (0) Cite this document
Summary
Digital certificates are more like identification cards in that they are electronic credentials that serve the purpose of certifying online identities of organizations, computers and individuals as an entity on the network. In addition, the certificates also contain the public…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.5% of users find it useful
Questions in Network Security
Read TextPreview

Extract of sample "Questions in Network Security"

Role of digital certificate and digital certification ity Digital certificates are more like identification cards in that they are electronic credentials that serve the purpose of certifying online identities of organizations, computers and individuals as an entity on the network. In addition, the certificates also contain the public key of the owner and also feature the organization that issued the certificate. These certificates are certified and issued by certificate authorities (CAs). The main function of CAs is to issue digital certificates. The other role of CA is to confirm the identity of the certificate’s holder or certificate’s subject and attest that the generated certificate’s public key is that of the certificate’s holder or certificate’s subject (Shoniregun 84).
Advantages of combined a/symmetric cryptography over both cryptographies
In symmetric key encryption (secret key encryption) method, data is scrambled by pressing same key to both decrypt and encrypt it while in asymmetric encryption (public key encryption), different keys are used to decrypt and encrypt. In addition to this, asymmetric encryption allows sharing of key since decryption key is kept to oneself while with symmetric key encryption, the key have to be kept secret. In combined a/symmetric encryption, a random symmetric key is created to encrypt the data then the key is encrypted asymmetrically. The key is added to the encrypted message after being asymmetrically encrypted (Shoniregun 122). After the receiver gets the key, using their private key they decrypt it and decrypts the message using it. Combined a/symmetric cryptography has several advantages over both cryptographies:
Combining symmetric and asymmetric encryption can help reduce brute force attack which is a common weakness of symmetric keys whereby, to break the encryption all keys in the key space are tried.
Asymmetric encryption helps in preventing creation of point attack while trying to improve feasibility of encrypted information through use of clearinghouse in symmetric encryption involving a large number of people.
The combines of the two methods takes the advantage of the speed of symmetric encryption with the convenience of asymmetric encryption.
Combination of the two helps solve the associated slow problem of asymmetric algorithms since symmetric encryption is approximately a hundred to a thousand times faster than asymmetric encryption.
When combined, key distributions and performance are facilitated without any security sacrifices.
How SSL/TLS works
SSL and TLS certificates are small sized data files used to digitally attach a cryptographic key onto organizational details. They both designed to serve the purpose of ensuring communications security over any computer network. These protocols directly operates on TCP’s top (though, there they are also implemented to suite datagram based protocols like UDP). Through this, secure connection is still provided and still top layers protocols remain unchanged (like HTTP). Underneath the SSL layer, HTTP and HTTPS are identical. When using TLS/SSL appropriately, all what is visible to an attacker over the cable is which port and IP you are connected to, roughly what compression and encryption is used and the quantity of data you are sending. He/she can also be able to end the connection, but this is realizable by both parties that a third party has tampered with the connections (Shoniregun 159).
Web Servers
CA Name/ Class
Asymmetric Algorithm/
Key length
Symmetric Algorithm/
Key length
Hash Algorithm
Your Rating of Security
(1-5)
Fidelity
Entrust Certification Authority-L1E
2048-bit
_
RSA-SHA2
3.5
Scottrade
VeriSign Class 3 Extended Validation SSL SGC CA
2048-bit
_
RSA-SHA1
3.7
PNC
Symantec class 3 EV CA – G2
2048-bit
_
RSA-SHA1
3.6
Chase
Symantec class 3 EV CA – G2
2048-bit
_
RSA-SHA1
3.4
Gmail
Google Internet Authority
2048-bit
_
RSA-SHA1
4
Yahoo! Mail
VeriSign Class 3 Public Primary Certification Authority – G5
2048-bit
_
RSA-SHA1
3.9
Twitter
Symantec class 3 CA – G4
2048-bit
_
RSA-SHA256
4.2
Conclusion
Security in internet connection and sending of information over the network is every individual’s, company’s or organization’s interests. Many are the times when personal or confidential information is read by unwanted or unauthorized persons through hacking. Encryption is one of the major protector and counter of this vice when properly done and through the right procedures. A choice has to be made on which cryptography to go for depending on the sensitivity of the information and the level of security desired.
Works Cited
Shoniregun, Charles A. Synchronizing Internet Protocol Security (sipsec). New York: Springer, 2007. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Questions in Network Security Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1685631-questions-in-network-security
(Questions in Network Security Coursework Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1685631-questions-in-network-security.
“Questions in Network Security Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1685631-questions-in-network-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Questions in Network Security

Network security

...the security of the college network after adding the wireless network (Wireless LAN) with the existing wired network (Local LAN). The problem for the Network administrators is focused on understanding that the security needs to be strengthened when a wireless network is added to the wired network. In addition to the questionnaire, interviews are also conducted with some questions to know the security issues raised after interconnection of the two networks. The research analyzes that the business impacts of combined wireless and wired...
50 Pages(12500 words)Dissertation

Network Security

...?Introduction Although there are batch of definition available on the Internet related to security. The definition available on ‘www.businessdictionary.com’ covers the basics and states it as: “Prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action”. In the context of network security definition, it consists of concerns linked to network communication privacy, confidentiality of data over the network, accessing unauthorised classified data, access to prohibited network domains and utilising Internet for concealed communication (Network Security. 2007). It is the twentieth century where improved communication technologies... ...
24 Pages(6000 words)Essay

Network Security

...ID # Network Security Introduction During the last few decades several technologies have been emerged throughout the whole globe and networking technology is certainly the most amazing achievement in this era. Additionally, the innovations in computer and networking fields have open new ways for the businesses to boost their performance. New systems are being developed to effectively handle and administer corporate working and activities. However, security has become a complex assignment for current network administration. Normally, attackers enter into a network by making use of different tools and technologies. In this...
13 Pages(3250 words)Research Paper

Network security

...?NETWORK SECURITY Network Security Affiliation Table of Contents Table of Contents 2 Type of Network Security 3 User and Password Based Access: 4 Firewalls 4 Antivirus Software 5 Data Backups 5 Network Security Devices 5 Security Cameras 5 DVDs/Tapes 6 Hardware Discussed 6 Printers and Scanners 6 Switch 6 Computer Server 6 Personal Computers 7 Recommendations 7 Staff Training 7 Update Passwords 7 Update Antivirus Regularly 7 Cloud-based Backup 8 References 9 Executive Summary In the past few years network security has turned out to be a serious challenge...
5 Pages(1250 words)Essay

Network Security

...transport architectures, and all devices have a specific transport mode that it associates with. Ultimately blackberry security is best when linked up with the blackberry enterprise server, which is designed specifically cooperate and commercial use. This server allows the smartphone to run on a remote platform with all the essential functionalities stored separate from the device. In essence, the blackberry can successfully be used for corporate business functions, and for personal use without any compromise on data integrity. Wi-Fi transport architecture provides internet connection to mobile devices, of a link to private networks. Through least cost routing, a wireless connection can be configured to...
7 Pages(1750 words)Essay

Network Security

...? Case Study on Network Security Bryant Wiersema American Public Case Study on Network Security Introduction The Internet has become a staple of the business world today. It is because of this that a company should remain continually up to date with the latest and most efficient security measures. With the dramatic growth in network reliance also comes the opportunity for illegal and malicious activity. One of the major computing challenges in today’s economy is the task of adequately securing a network - ensuring sensitive data is not compromised. Vulnerabilities due to designs flaws, poor...
3 Pages(750 words)Case Study

Network Security

...making policies for network security. The three main issues back in the earlier days were Confidentiality, Integrity and Availability. Due to the advances in the technologies, these issues have been mostly resolved. But in the present day Networks, other issues have appeared. These issues will eventually result in the breaching of confidentiality, integrity and availability thereby defeating the cause of coming up with Network Security policies. We can ask the following questions to resolve the recent issues related to Network Security: Should Identity Manager be put back to the User Identity...
5 Pages(1250 words)Essay

Network security

...Network Security Part Today, the computer networking systems are highly vulnerable and prone to the hackers, viruses and other cyber dacoits. Therefore the network security systems have to be sound dependable and free from risks (Marcel Dekker, New York, 1997). This is only possible if the systems and service packs are continuously updated and different versions are enhanced. This dream of a foolproof secure network system can only be realized when the computer hardware is 100% compatible with the policy of security protocols. The following check list helps out the situation in an effective manner. As far as the computer hardware compatibility list (HCL) is concerned the peripherals must be compatible... with the...
6 Pages(1500 words)Essay

Network security

...Network security s of Learning Discuss the term confidentiality as it applies to data. How can data confidentiality be assured on a network? Data confidentiality entails allowing authorized users to access particular data, while preventing unauthorized access of data by intruders. When access eavesdrops into particular data, the principle of confidentiality will not hold. In networks, encryption is the principle techniques of maintain data confidentiality. This process is achieved using encryption algorithms that are used to generate keys for encrypting and decrypting data. 2. Explain the concept of technical security controls. What are some the major components that make up technical control? Technical security controls are used... to...
2 Pages(500 words)Essay

Network Security Questions

...Assignment, Computer sciences and Information technology Network Security Questions Question How to mitigate Configuration Weaknesses In order to mitigate the weaknesses with network configuration, the first step is to identify the causes. Causes of configuration weaknesses When installations are done based on the default settings of the system, there is no regard for network security and the default configuration is not reset. This compromises the configuration standards of the network. The second cause is by setting configuration properties that do not conform to the services that run on the...
2 Pages(500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Questions in Network Security for FREE!

Contact Us