Free Samples
MATHS 3026 Cryptography III
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
MATHS 3026 Cryptography III
0 Download7 Pages / 1,674 Words
Course Code: MATHS 3026
University: The University Of Adelaide
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Questions:
Topic 1 – Cryptography
Discuss replay attacks and ways to thwart them.
Topic 2 – Network Security fundamentals
Critique the four general goals for secure networking using suitable examples.
Topic 3 – Firewalls
UDP is connection-less. How is it possible for an SPI firewall to handle UDP connections? Explain.
Topic 4 – Host hardening
What is a security baseline? Why is it important in the context of organisational security?
Answers:
Topic 1 – Cryptography
Discuss replay attacks and ways to thwart them.
Basically, replay attacks take place when a hacker eavesdrops on a secured network while there is a communication process in progress, intercepts that communication and the fraudulently delays and resends the message after altering it in order to lure the receiver to do what the hacker wants (Alegre, Janicki & Evans, 2014). The dangerous fact about this hacking method is that the hacker does need to have decrypting skills after capturing the message from the network because the attack is fully successful by simply sending the whole message.
How it takes place
Considering a real world example of an attack where a staff member in a company sends a message to another staff member requesting for financial transfers with an encrypted message, when an attacker eavesdrops on the message and captures it and later resends it, the receiver on the other end of communication channel with take this message as legit because it is correctly encrypted and the possibility of responding to this new message is very high unless he or she is very conscious (Hoehn & Zhang, 2016).
Preventing this type of an attack entails having right encryption methods. This is in consideration to the fact that en encrypted message has keys within it and when it is decoded at the other end of transmission, the message is opened. So in this case, it doesn’t matter whether the attacker intercepting the original message can read it or decipher the key. All he has to do is to capture and resend the whole thing, message and the key (Hoehn & Zhang, 2016). To prevent this, both the receiver and the sender are supposed to establish session keys which are random in form of codes that are valid for only one transaction and can’t be used anymore after the first transaction.
Also, replay attack can be prevented by the use of timestamps on all the messages being send from the sender to the receiver and vice versa. This hinders the attacker from resending messages after certain time duration elapses, hence minimizing the chances of the attacker for a successful eavesdrop, message siphoning and resending of that message (Hoehn & Zhang, 2016).
Topic 2 – Network Security fundamentals
Critique the four general goals for secure networking using suitable examples.
The first Network Security goal is Confidentiality and whose role is to protect organization data (both in storage and in motion) from landing on unauthorized hands. Confidentiality ensures that data is only available to the intended and the authorized persons (Behringer et al, 2015). Organization data can therefore be accessed by only the individuals who are permitted. However, this goal has a weakness in that it does not cover the personification aspect. For that matter, if an unauthorized person manages to steal passwords from an authorized person, he or she will be able to access the system.
Integrity is the second goal after confidentiality; this goal aims at assuring and maintaining data accuracy and consistency. Its role Integrity is to ensure that system data is both accurate and reliable and that it cannot be changed by any unauthorized person (Ambrosin et al, 2016). The data being received by the second party in a case of communication must be same just as the one which had been sent, without any alteration. This does not take care of the incidences of eavesdropping.
The third goal is the availability. This goal ensures that Data, all the network resources and other services are readily available to the authorized users at any time they require it. For that matter, if an unauthorized person manages to steal passwords from an authorized person, he or she will be able to access the system (Luan, Lu, Shen & Bai, 2015).
The last goal is Nonrepudiation, that ensures the identity of network users is recorded and kept safely for future responses and that any person who might have been involved in any suspicious activity won’t be able to deny (Luan, Lu, Shen & Bai, 2015).
Topic 3 – Firewalls
UDP is connection-less. How is it possible for an SPI firewall to handle UDP connections? Explain.
SPI firewall which fully stands for Stateful Packet Inspection is a high level security mechanism used to check packets and keep track of all the connection states within a network. SPI firewall provides various advantages within a network environment. First, it keeps track of all the states of different network connections, enables detailed inspection on the packet states within a network environment and lastly but not least, it enhances dynamic protection against malicious packets that may penetrate into a network through the connections.
SPI firewalls can treat UDP communications as if they were stateful by treating some certain UDP messages as connection opening attempts (Vijayakumar, Dade, Thomas & Verma, 2014). If subsequent messages match the connection table for the UDP packet, the incoming UDP packet will be passed.
In other words, the information on connectionless sessions will be kept within the same session table just like in the case of TCP traffic. Then, timeout values are used to allow closure of the sessions if either application layer protocols are unknown, are hindering execution of termination commands or have encountered communication errors. If the application layer gateway is applied, then the firewall understands the protocols under this layer and can therefore see when the session closed shut, the session will therefore get closed out immediately.
Topic 4 – Host hardening
What is a security baseline? Why is it important in the context of organizational security?
Security Baseline refers to the set of rudimentary security objectives that must be upheld by any information system. Those objectives must be pragmatic and fully complete to ensure that they don’t impose other technical means (Schory, Raz & Gonda, 2015). For that matter, the details outlining how those security objectives are met by any system are documented in a different Security Implementation Document. The details depend on the functional environment where the system is arrayed into, creatively using and applying all relevant security measures. There is also a possibility of derogations from security baselines which must be clearly marked (Bauer et al, 2016).
Importance of security baselines in the context of organizational security
Monitoring Unusual Network Activity
If there is a huge spike on network traffic, there could arise some form of volumetric denial of service attack. But security baselines are able to do more than that. For instance, a normal traffic pattern within a network indicates that a network is being used to access a CRM system, e-mail, and maybe Internet. However, if there is a sudden traffic from the user’s computer to an accounting server could mean that such a computer has been hacked and a certain malware is trying to access and interfere with financial information (Schory, Raz & Gonda, 2015). Any abnormal traffic is therefore first directed towards the quarantining endpoint courtesy of security baseline and that greatly helps in mitigating risks on the network as well as minimizing the damages which would occur as a result of breach.
Measuring Changes within a Network
Baselines help in measuring the impacts of architectural changes within an organization network infrastructure. For instance, a company using traditional MPLS network can set its baselines to monitor traffic flow over its WAN links (Schory, Raz & Gonda, 2015). The baseline can be used to help in understanding whether the business is spending the network rightfully or over-spending it. Also, for an organization that is aspiring for WAN optimization, the baseline can be reset to measure its bandwidth ‘before’ and ‘after’ use. Through that, the organization can adjust the circuit size being purchased in order to reduce high spending on network.
References
Alegre, F., Janicki, A., & Evans, N. (2014, September). Re-assessing the threat of replay spoofing attacks against automatic speaker verification. In Biometrics Special Interest Group (BIOSIG), 2014 International Conference of the (pp. 1-6). IEEE.
Hoehn, A., & Zhang, P. (2016, July). Detection of replay attacks in cyber-physical systems. In American Control Conference (ACC), 2016 (pp. 290-295). IEEE.
Behringer, M., Pritikin, M., Bjarnason, S., Clemm, A., Carpenter, B., Jiang, S., & Ciavaglia, L. (2015). Autonomic networking: Definitions and design goals (No. RFC 7575).
Ambrosin, M., Conti, M., Ibrahim, A., Neven, G., Sadeghi, A. R., & Schunter, M. (2016, October). SANA: secure and scalable aggregate network attestation. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 731- 742). ACM.
Vijayakumar, R., Dade, N. S., Thomas, J., & Verma, A. (2014). U.S. Patent No. 8,826,413. Washington, DC: U.S. Patent and Trademark Office.
Schory, O., Raz, O., & Gonda, O. (2015). U.S. Patent No. 9,137,204. Washington, DC: U.S. Patent and Trademark Office.
Bauer, E., Schluga, O., Maksuti, S., Bicaku, A., Hofbauer, D., Ivki?, I., … & Tauber, M. (2016). Towards a Security Baseline for IaaS-Cloud Back-Ends in Industry 4.0.
HE, L., JIA, Q. J., LI, C., & XU, H. (2016). College of Land and Resources, Agricultural University of Hebei; College of Rural Development, Agricultural University of Hebei; College of Resources and Environmental Sciences, China Agricultural University; Baoding Institute of Ecological Civilization of Hebei;; Calculation on ecological security baseline based on the ecosystem services value and the food security [J].
Luan, T. H., Lu, R., Shen, X., & Bai, F. (2015). Social on the road: Enabling secure and efficient social networking on highways. IEEE Wireless Communications, 22(1), 44-51.
Vijayakumar, R., Dade, N. S., Thomas, J., & Verma, A. (2014). U.S. Patent No. 8,826,413. Washington, DC: U.S. Patent and Trademark Office.
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 7 pages
PAY 5 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2021). Cryptography III. Retrieved from https://myassignmenthelp.com/free-samples/maths-3026-cryptography-iii/network-security-fundamentals.html.
“Cryptography III.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/maths-3026-cryptography-iii/network-security-fundamentals.html.
My Assignment Help (2021) Cryptography III [Online]. Available from: https://myassignmenthelp.com/free-samples/maths-3026-cryptography-iii/network-security-fundamentals.html[Accessed 18 December 2021].
My Assignment Help. ‘Cryptography III’ (My Assignment Help, 2021)
My Assignment Help. Cryptography III [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/maths-3026-cryptography-iii/network-security-fundamentals.html.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
Choosing the best writing service takes most of our effort. It is essential to ensure if the expert writers are flexible in handling all types of college essays. Unlike other writing services, MyAssignmenthelp.com provides the students with custom writing help on different essays. If you want to have assurance on a plagiarism-free essay, MyAssignmenthelp.com is the place to be. Hire professionals to get the best experience from the leading academic writing service today.
Latest Management Samples
div#loaddata .card img {max-width: 100%;
}
MPM755 Building Success In Commerce
Download :
0 | Pages :
9
Course Code: MPM755
University: Deakin University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More
SNM660 Evidence Based Practice
Download :
0 | Pages :
8
Course Code: SNM660
University: The University Of Sheffield
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration
BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20
Course Code: BSBHRM513
University: Tafe NSW
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More
MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5
Course Code: MKT2031
University: University Of Northampton
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration
MN506 System Management
Download :
0 | Pages :
7
Course Code: MN506
University: Melbourne Institute Of Technology
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology
Next
Our essay writers will gladly help you with:
Powered by essayworldwide.com