Free

U3 Discussion - Essay Example

Comments (0) Cite this document
Summary
In that implementation, protocols such as HTTP that are on higher layers remain unchanged but still provide a very safe connection. The process will involve establishing a TCP connection from the client to the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
U3 Discussion
Read TextPreview

Extract of sample "U3 Discussion"

Using Certificates Online Insert Insert One of the advantages of using certificates is that it ensures that only the intended recipients read any data sent online. How does it actually ensure that the intended recipient only reads the data?
The consideration in our case is one of SSL operating over TCP. In that implementation, protocols such as HTTP that are on higher layers remain unchanged but still provide a very safe connection. The process will involve establishing a TCP connection from the client to the server via SSL handshake (Quillen, 2012). In building the connect, the client makes some specifications like the SSL running, the cipher suites it intends to use and compression methods of choice. The server confirms availability of the SSL compatible for both of them and a means of compression.
The server is then ready to send the certificate. The way it works is for the client to trust the certificate or a party that the client trusts e.g. Geo Trust. What follows is a verification process to ascertain that the server is not someone else in the middle before a key is exchanged. The cipher suite will determine whether to use a public key, nothing or a PreMasterSecret. The client and the server will consequently perform a computation on symmetric encryption (., 2013). Client to the server communication is to alert the server that the messages it will receive from the client will be encrypted and sends a message to the server that is encrypted.
The server is tasked with confirming the MAC address of the client and to determine that it is correct. The latter is for authentication. The server will decrypt the message and send a message to the client for verification. Communication is completed by a close notification alert. Attackers use FIN packet to terminate a TCP connection. However both the client and the server will know.
References
., S. (2013). ENHANCED SECURITY FRAMEWORK TO ENSURE DATA SECURITY IN CLOUD USING SECURITY BLANKET ALGORITHM. IJRET, 02(10), 225-229. doi:10.15623/ijret.2013.0210033
Quillen, W. (2012). Mastering online genealogy. Cold Spring Harbor, N.Y.: Cold Spring Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“U3 Discussion Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
U3 Discussion Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1691135-u3-discussion
(U3 Discussion Essay Example | Topics and Well Written Essays - 250 Words)
U3 Discussion Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1691135-u3-discussion.
“U3 Discussion Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1691135-u3-discussion.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF U3 Discussion

Congress U3

...?Congress U3 Introduction Separation of powers as per the U.S. Constitution gives Congress an important position as a branch of government due to it being representative of the various opinions and aspirations of the citizens of the country. This position of the U.S. Congress makes it an important and integral part of the agenda of any U.S. President, with the potential to make or break it. (1). The Congress and Obama’s Agenda The powers in a war situation clearly of the President and the Congress demonstrate the separation of powers between these two branches of government. According to the U.S. Constitution the Congress retains the power to declare was and through its control of the purse strings can bring about a...
1 Pages(250 words)Essay

MGMT458 U3 IP UPS

...MGMT458 U3 IP UPS The Internal Structure of United Parcel Service The company is the largest organization in the shipment of products in the world. The service delivery of the company is time-definite. The company involves the delivery of documents the world over. The company has expanded its operation capacity to the inclusion of supply chain services. The company’s operation has three levels of operation that include the US domestic package operation, the supply chain and freight, and internal package operations levels (Dennis, 2011). The US domestic package involves the timely delivery of documents and other forms of packages throughout the United States. Internal package involves shipments done outside the USA and it...
1 Pages(250 words)Research Paper

MGMT499 U3 DB

... Employee Grading Form of the Employee…………. Department……………………… of the Reviewer………….. Date of Review…………………. Leadership Skills Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Honesty Communication Skills Confidence Commitment Cooperation Interpersonal Skills Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Creative Thinking Diversity Encouraging Empathy Flexibility Earned Values Excellent (3pts) Good(2pts) Fair (1pt) Poor (0pt) Initiative Punctuality Work Consistency Creativity Work Quality Using the grading form displayed above, James Anderson, a supervisor with one of the companies that worked for in the past can be classified as having excellent interpersonal skills, earned values and leadership skills. On the earned values...
1 Pages(250 words)Research Paper

U3 Discussion

...AD Domain Part one A strategically designed Active Directory Group assists simplify administration and attain greatest flexibility. Nevertheless, configuring groups and assigning various group attributes is a multifaceted process that engages several steps when performed using native Active Directory tools, PowerShell, To limit this dilemma and make Group Management easier, ADManager Plus streamlines all these people’s tasks and aid one to manage groups from a centralized web console. ADManager Plus has an exclusive characteristic dedicated for Group Management that make things easier creating and managing Security and Distribution Groups in Active Directory. One can include or remove numerous group members, define various... Domain Part one...
1 Pages(250 words)Coursework

U3 Research Project

...U3 Research Project al affiliation Active Directory Domain and Organizational Unit A domain is essentially a container object that shares security policies, directory database, and trust relations with other domains. It acts as an administrative boundary for the objects contained in it. It enables an administrator to manage the administrative needs of their organization. It is used to control the points of replication of data in a forest. The main advantage of domains is that it they are partitioned, enabling organizations to control the replication of data in specific places where it is needed (Microsoft, 2014). Transitive trust between domains reduces the number of relationships that the Active Directory establishes and...
1 Pages(250 words)Coursework

U3 Case Study

...U3 Case Study U3 Case Study Secure Socket Tunneling Protocol (SSTP) refers to an application-layer protocol. The design of SSTP allows it to use a synchronous communication between two programs in a back and forth motion. Working of SSTP between a VPN client and server occurs in multiple steps. First, the SSTP client must be in need of an internet connectivity. After verifying the Internet connectivity by the protocol, establishment of a TCP connection to the server on port 443 then follows. SSL negotiation then takes place above the TCP, which is already established. Validation of the server certificate then happens. The connection is established if the certificate is valid; otherwise, the connection...
1 Pages(250 words)Coursework

U3 Lab Reprort

...Networking Lab Activities Networking This paper seeks to illustrate the objectives of lab activities that were done during the semester and their application in the career that awaits ahead. First, it is worthy to note that these lab activities are purely networking labs. This is because they deal with various aspects routing concepts and network configurations. The main objective of these lab activities is the expose the participants to how various networking concepts have over the years been used to integrate different kinds of technologies in order to enable information exchange. Great technological advancements have been made within the last decade. One area that has been greatly impacted by these advancements... Lab Activities Networking ...
1 Pages(250 words)Lab Report

CIS206 U3 Discussion

...but its not feasible to reduce that size. Thus as a precaution it is advisable to start with a smaller size. Ext4 evolves from ext3. It has the advantage of writing in a journal before updating the file system. It has made it good in recovering from crashes. It also adds wonderful management to adjacent data in files. Its performance in reading is good. Since it is very recent, a lot of tests are still underway. Discuss some of the reasons why you feel an administrator might impose a disk quota system on a Linux server. Challenges of implementing a general quota upon all corporate users? An administrator imposes a disk quota system on a Linux server so as to distribute the disk space among the users or groups according...
1 Pages(250 words)Coursework

CIS212 U3 Discussion

...How Users Access and Logon to Systems Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system. Its main objective is to make sure that undesired users do not get access to certain information; only those who are allowed can access. Role-based access control and Discretionary Access Control both are based on defining the roles and adding each user to the system. Authorization and privileges are granted. The main difference between these two user control assets is that RBAC has ease of management while DAC is complicated since each new user has to go through all the details the user needs access to and add... Users...
1 Pages(250 words)Essay

CIS256 U3 Discussion

...Domain Service Insert Insert Domain Service is a service geared to convert words that can be physically read by the human being into IP addresses (Dettmer, 2003). These names represent the names of particular hosts. When the domain name is said to be fully qualified, it means that the hostname is a summation of the hostname and the domain name. For instance, gendersoft.domain.com. I would prefer Microsoft domain name service as compared to BIND DNS. The reasons for this include the centrality of access to the role as a part of the Windows server package (Minasi, 2014). It has a feature to allow it for configuration to suit both the recursive, authoritative and hybrid modes. Further, it has a DNS zone file that facilitates... Service Insert...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic U3 Discussion for FREE!

Contact Us