logo

TCP/IP Suite Security Exploration

   

Added on  2019-09-16

1 Pages339 Words369 Views
 | 
 | 
 | 
1. Create a table of the four architectural layers of the TCP/IP suite. Include common protocols at each layer.Layer Protocols Responsibility2. In a brief essay explain the concept of encapsulation. What is it and why is it important for you to understand? Are there encapsulation vulnerabilities that can be exploited?3. Designing a Secure Network. Take two of the technologies from the list in the textbook and briefly describe what they are and why they are used in the topology of a secure network.4. In a brief essay explain the difference between the three types of firewalls. Provide a brief scenario of the use of each of the three.5. Do some research on the vulnerabilities of routers and switches. Describe at least two vulnerabilities for each. What can be done to reduce the threat to these two devices?6. Create a table of the four types of intrusion detection systems. Type Description How it is used7. Authentication is based on one or more of five factors. Create a table of these five. Factor Example8. In a short essay describe the pros and cons of implementing a single factor authentication system and of implementing a multifactor authentication system. Cite your resources.9. In a short essay explain Layered Security and Defense in Depth. Give an analogy for the philosophy behind this from another area (Eample: physical access to a military base).10. In a short essay describe Transitive Access. Explain why this is an important technique for large networks.11. There are four primary methods of access control (Example: Mandatory Access Control). Create a table of these four and describe them. Access Control Method Definition12. Create a table that summarizes the five tunneling protocols outlined in the text.Protocol Definition Use
TCP/IP Suite Security Exploration_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
VPN Network Design for SME - Network and VPN Services
|15
|1015
|292

Data Encryption Standards for WiMAX Networks
|6
|928
|23

Networking and Software Design Patterns
|10
|1561
|50

Introduction to Networks and Internetworks
|25
|7002
|65

The OSI and TCP/IP Models (PDF)
|9
|1512
|110

Computer Networks: A Comprehensive Study of TCP/IP, Ethernet, and Network Security
|13
|2884
|151