Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The paper “Computer Network Security” is a great example of an assignment on information technology. Unlike the conventional way where a virus is hidden in window system folders with the notion one cannot find access to them, this proves unreliable since they can be still be accessed by anti-virus as well as malware detection programs…
Download full paperFile format: .doc, available for editing
Computer and network security
Name:
Course:
Tutor:
Date:
C–1.5
Unlike the convectional way where a virus is hidden in window system folders with the notion one cannot find access them, this proves unreliable since they can be still be accessed by anti-virus as well as malware detection programs. One of the way to ensures that an anti-virus goes unnoticed by a security administrator is through binding a virus file to a legitimate file such as a music, movie or even as document file.
In order achieve this you will probably need a binder program that will join the two files into one. To begin of first make sure you have your executable anti-virus in place by this assuming it is has a (.exe) extension. After this select a legitimate file for instance an image file that you will use to bind with your virus. Once you have set up your virus code to execute through your preferred compiler and given it a suitable label for example myhit.exe. You can make your antivirus do whatever you please. But keeping in mind our aim is to make it undetectable we can then use an image file as its icon. Unless an intelligent anti-virus is deployed by the security anti-virus to detect the virus signature, one can often neglect
C-1.9
To better answer this question we have to consider that the possibilities of digits range between 0 and 9, this implies combinations from 0000 to a possibility of 9999. (Wang, 2009) One way to best calculate this is to approach this mathematically, where it would entail the formula n^x (n is the number of possible digits which in our case is 10 counting from 0 to 9) and x is the combination number which in the case of an ATM (Auto Teller Machine) pin is 4 since it takes four digits. However note that n^x implies n is raised to the power of x more specifically 10^4 in our case. To get the accurate answer we get a total combination possibility of 10,000. In a bad case scenario this would imply that the thief key in 10,000 times to get the correct pin.
C- 1.20
To facilitate joint projects on software development I would recommend the use of Team server. To utilize the Team server, members of the software development team will have to install the team server plug-in and then register the Team server with the IDE in this case I am assuming a modern IDE preferable Netbeans 7.0. This tool ensures that developers collaboration on a joint project remains connected to each other as a team. Team members can share resources, share information and communicate with each other. The Team Server tool provides a scalable, flexible platform for development that can grow as the project becomes bigger. This tool improves security by ensuring members of the development team can only access shared resources through login so as to access the Team Server dashboard
C - 2.4
A case of accountability raised by the blue and red pirates by seeking a solution for a joint access of their treasures at once poses a simple challenge that can be easily addressed. Since it’s their intention that both teams have access to their treasures in the presence of at least an opponent, the challenge presented is the case of divided control. Due to the fact that security of there is provided by use of tow locks, one of the easiest ways of facilitating this operation would be to ensure that each group has their own different tow locks hence the chest should be secured by two tow locks, one from the red pirates and the other from the blue pirates. In this case opening the chest will only happen if both locks are opened simultaneously and since the padlocks belongs to different groups it makes sure access is only done in the presence of an opponent pirate group.
C-2.9
To make biometric authentication protocol more secure, one of the ways this can be done is through a hybrid authentication protocol based several researches for instance one done by Bringer and company that has improved the process in many ways (Wang, 2009). More specifically higher authentication accuracy can be achieved using state of the art multi-class classifier pattern recognition. This classifier supports vector Machines in combination with an encryption scheme based on the Pallier public key encryption scheme. Another way to make biometric authentication more secure is by using a Support Vector Machines (SVMs) as an identification classifier instead of an authentication classifier. This can greatly improve privacy since no user identities are transmitted at any point of the protocol. In this case despite the fact that one can program a smartcard one cannot obtain the data stored since it will not render user data stored in the card.
C-2.12
Once listed in a no-fly list, the implication is that you will not be able to board a flight. However despite the serious restrictions effected by the authorities, the possibility of a loophole arises especially in consideration to the fact that there is no common restriction list provided to other state agencies outside the travel sector (Wang, 2009). This factor makes this regulation prone to exploitation. Take for example your name I Johannes Mathew, it would be obvious for the no-fly list to include the same as identified by your government issued ID. However one of the ways you can bypass this measure would be by legally changing his official name.
By taking this action say the name was changed to ‘John Mathew’, this name changed would not be immediately reflected in the no-fly list. Hence one can still make flight reservation by using his new name. However one key solution to this loophole can be curbed is by authorities making sure that there is a sharing of information across all sector and as such even to the legal departments. In this way changes in one’s identity that would compromise the no-fly list would be easily noticed and updated immediately making the system up to date.
C-3.2
Picture based passwords as compared to standard passwords are in some ways considered appealing though they have several security loopholes as compared to standard password in the following areas: First of all in the case where 20 images have to be rendered from 40 raises the problem of space. This would be of great disadvantage especially to small screen devices such as netbooks and tablets or low resolution screen.
Secondly another problem is that passwords can be predictable on the case of user interests. For instance it is only logical that people would like to associate with images that fall under their interest (Wang, 2009). If for example I know my friend has an interest in football, I stand a greater chance of unlocking his password if I choose football related pictures.
Another disadvantage of image passwords that makes it unsecure as compared to standard password is the fact that the user choices can be captures by someone else during entry as compared to standard passwords that remain hidden by use of password characters. Therefore the standard password remains secure as compared to the picture passwords as it is less vulnerable to breaches as posed by the picture password.
C-3.5
One of the key knowledge one has to have to exploit share archiving system is to first know the systems root password. Secondly by knowing the platform to which the share files overwrites during extraction process (Wang, 2009). This is because self-extracting share is platform specific for instance a windows self-extracting share would not operate the same way in another platform such as Mac. This would give one the read, write and execute access to process the share commands. This problem can be solved by addition of extra programming codes to prevent cases of automatic overwrites.
Reference
Wang, J. (2009). Computer Network Security. Berlin: Springer.
Read
More
This report "Design for Computer Network Security" discusses network vulnerabilities that are constantly at a rise, the current network security vulnerabilities are evaluated in three categories i.... It has been concluded by some experts that the year 2012 is considered to be the worst year in terms of Computer Network Security breaches (Schirick 2012).... Likewise, the year that has not even passed the half-year mark, some of the foremost companies were sufferers of network security breaches resulting in massive losses (Schirick 2012)....
The paper "A Critical Analysis of Computer Network Security Methods" tells us about information technology.... Salient components of IPsec are AH (Authentication Header) and ESP (Encapsulating security payload).... AH consists of next header information (8 bits), payload length information (8 bits), identification for security association (32 bits), sequence number (ordering sequence of datagrams, 32 bits), variable authentication data containing ICV ( Integrity check value) or MAC and reserved 16 bits for future expansion (Stallings, William, 494 and Forouzan, Behrouz A....
The present essay "Taha Computer Network Security Services" provides a business plan for a Computer Network Security company known as Taha.... Taha Computer security services business is a new organization that will offer computer security services to its clients since the world is in the midst of a global technological revolution, which will bring change in all proportions of the world.... aha Computer security Service Company has a competitive advantage over any other business since there is none other company that offers computer security services in the region....
The document further provides a clear blue print for Computer Network Security management.... In the paper 'Security policy document' the author examines security policy document which entails a document that contains rules/policies practices, laws and procedures for regulating accessibility to a computer network.... The author of the paper states that the General security architecture entails an integrated security design that helps to solve security threats/ risk that may emerge in an organisation....
My recommendation to the company CEO of the Computer Network Security Company regarding the client who intends to buy partial services is that she should decline the client's request.... Another thing that underpins my recommendation Ethics in Information Technology Part A My recommendation to the company CEO of the Computer Network Security Company regarding the client who intends to buy partial services is that she should decline the client's request.... This is because the company might not be able to establish the efficacy of the other levels of the client's security system that were done by another or other Computer Network Security companies (George 45)....
?Computer Network Security.... In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system.... In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system.... Network reconnaissance is an important process as it helps to identify security threats to the system and services provided.... Facilitates solution to Cyber-security which is an area in which much course development is taking place and of much interest, Cyber-security training is important and necessities to be extended....
Guide to Computer Network Security.... The KDC server Computer Security Kerberos computer network Authentication Protocol Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation.... Cryptographic Protocol: security Analysis Based on Trusted Freshness.... Kerberos serves as a network authentication protocol that allows for mutual identification, in which case the computer server and the user identify one another in the course of operation....
This essay "Network Security Attack Methodologies" is about the current Computer Network Security systems which are faced by numerous attacks, thus creating the need for robust means of protecting the systems against threats and potential attacks.... Traditionally, the attack on network security systems was purely a matter of fun, where the computer systems attackers and hackers were doing it for the fun of enjoying their prowess in managing to tamper and penetrate through established network security systems....
7 Pages(1750 words)Essay
sponsored ads
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"Computer Network Security"
with a personal 20% discount.