COIT20262 Assignment 2 Submission
VerifiedAdded on 2023/01/04
|6
|821
|58
AI Summary
This document is the submission for Assignment 2 of COIT20262 - Advanced Network Security course. It includes questions on HTTPS and Certificates, Authentication and Access Control, Firewalls and iptables, and Internet Privacy.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT20262 Assignment 2 Submission Term 1, 2019
COIT20262 - Advanced Network Security, Term 1, 2019
Assignment 2 Submission
Due date: 5pm Friday 7 June 2019 (Week 12) ASSESSMENT
Weighting: 45%
2Length: N/A
Student Name: enter your name
Student ID: id
Campus: campus
Tutor: tutor
Advanced Network Security Page 1 of 6
COIT20262 - Advanced Network Security, Term 1, 2019
Assignment 2 Submission
Due date: 5pm Friday 7 June 2019 (Week 12) ASSESSMENT
Weighting: 45%
2Length: N/A
Student Name: enter your name
Student ID: id
Campus: campus
Tutor: tutor
Advanced Network Security Page 1 of 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262 Assignment 2 Submission Term 1, 2019
Question 1. HTTPS and Certificates
Part (d)
What hash algorithm is used to generate the certificate
signature?
What encryption algorithm is used to generate the
certificate signature?
How many bytes is the public key modulus in the
certificate?
In the TLS cipher suite used between client and server,
what algorithm is used for:
- Encrypting session data?
- Hashing for the MAC?
- Key exchange?
How many bytes of random data are sent from the client
to server at the start of the handshake?
Part (e)
Write your answer here
Advanced Network Security Page 2 of 6
Question 1. HTTPS and Certificates
Part (d)
What hash algorithm is used to generate the certificate
signature?
What encryption algorithm is used to generate the
certificate signature?
How many bytes is the public key modulus in the
certificate?
In the TLS cipher suite used between client and server,
what algorithm is used for:
- Encrypting session data?
- Hashing for the MAC?
- Key exchange?
How many bytes of random data are sent from the client
to server at the start of the handshake?
Part (e)
Write your answer here
Advanced Network Security Page 2 of 6
COIT20262 Assignment 2 Submission Term 1, 2019
Question 2. Authentication and Access Control
Part (e)
Write your answer here
Part (f)
Write your answer here
Part (g)
Write your answer here
Advanced Network Security Page 3 of 6
Question 2. Authentication and Access Control
Part (e)
Write your answer here
Part (f)
Write your answer here
Part (g)
Write your answer here
Advanced Network Security Page 3 of 6
COIT20262 Assignment 2 Submission Term 1, 2019
Question 3. Firewalls and iptables
Part (a)
Include screenshot here. (Do not submit the file separately)
Part (b)
Include screenshot here. (Do not submit the file separately)
Part (c)
Include screenshot here. (Do not submit the file separately)
Part (d)
Include screenshot here. (Do not submit the file separately)
Part (f)
Write your answer here
Part (g)
Write your answer here
Part (h)
Write your answer here
Advanced Network Security Page 4 of 6
Question 3. Firewalls and iptables
Part (a)
Include screenshot here. (Do not submit the file separately)
Part (b)
Include screenshot here. (Do not submit the file separately)
Part (c)
Include screenshot here. (Do not submit the file separately)
Part (d)
Include screenshot here. (Do not submit the file separately)
Part (f)
Write your answer here
Part (g)
Write your answer here
Part (h)
Write your answer here
Advanced Network Security Page 4 of 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262 Assignment 2 Submission Term 1, 2019
Question 4. Internet Privacy
Part (a)
The main working of web proxy server could be analysed as gateway among internet as well
as the client and it performs the separation among the client from any website that is surfed
by them. The main intention of using the proxy is to provide the various levels of extensive
privacy, security along with privacy relying on all the requirement and the policy of
organisation. In the situation of utilising proxy servers, the flow of the traffic through the
proxy for reaching the designated address. Throughout the major utilisation of the proxy
server, any user is required to construct the settings of the browser and then provide the IP
address as well as the port number of that proxy server that is available under the choice of
Manual Proxy Configuration”.
Proxy servers could be utilised for the various kinds of safekeeping like:
Maintenance of extensive anonymity by the hiding of authentic IP address
Maintenance of distortion by creation of improper IP address accessible by the
utilisation of the http header
Maintenance of significant transparency by creation of the unique IP address
accessible with utilisation of the headers of http
Some of the specific security and the convenience restrictions of proxy are
categorised as:
In some situations, the secured password and the data could be managed in the cache
structure and monitored by the service provider
Proxy servers could be exploited for retrieving the obstructed websites and frequently,
these obstructed websites might be significantly invasive and it could lead to harm to
that system where the blocked website are accessed from.
Part (b)
VPN could be used by the users for gaining these benefits:
Extensive encryption of the internet traffic
Maintain the anonymous mode while accessing the various browsers
Prevention of the throttling of the bandwidth
Significant avoiding of the censorship of internet
The secure access of the internet regardless of the kind of the network (Private or
public)
With the proper utilisation of the VPN, the users could gain the benefit of accessing
information remotely from any location that allows the proper accessing of content if
there are any restrictions on the website.
The major restrictions of the VPN over the web proxy could be categorised as:
Significant capital is required for accessing the VPN services
It could immensely slow down swiftness of the internet as it suggests more than just
any server
Advanced Network Security Page 5 of 6
Question 4. Internet Privacy
Part (a)
The main working of web proxy server could be analysed as gateway among internet as well
as the client and it performs the separation among the client from any website that is surfed
by them. The main intention of using the proxy is to provide the various levels of extensive
privacy, security along with privacy relying on all the requirement and the policy of
organisation. In the situation of utilising proxy servers, the flow of the traffic through the
proxy for reaching the designated address. Throughout the major utilisation of the proxy
server, any user is required to construct the settings of the browser and then provide the IP
address as well as the port number of that proxy server that is available under the choice of
Manual Proxy Configuration”.
Proxy servers could be utilised for the various kinds of safekeeping like:
Maintenance of extensive anonymity by the hiding of authentic IP address
Maintenance of distortion by creation of improper IP address accessible by the
utilisation of the http header
Maintenance of significant transparency by creation of the unique IP address
accessible with utilisation of the headers of http
Some of the specific security and the convenience restrictions of proxy are
categorised as:
In some situations, the secured password and the data could be managed in the cache
structure and monitored by the service provider
Proxy servers could be exploited for retrieving the obstructed websites and frequently,
these obstructed websites might be significantly invasive and it could lead to harm to
that system where the blocked website are accessed from.
Part (b)
VPN could be used by the users for gaining these benefits:
Extensive encryption of the internet traffic
Maintain the anonymous mode while accessing the various browsers
Prevention of the throttling of the bandwidth
Significant avoiding of the censorship of internet
The secure access of the internet regardless of the kind of the network (Private or
public)
With the proper utilisation of the VPN, the users could gain the benefit of accessing
information remotely from any location that allows the proper accessing of content if
there are any restrictions on the website.
The major restrictions of the VPN over the web proxy could be categorised as:
Significant capital is required for accessing the VPN services
It could immensely slow down swiftness of the internet as it suggests more than just
any server
Advanced Network Security Page 5 of 6
COIT20262 Assignment 2 Submission Term 1, 2019
The logs are used for the recording of connection and this leads to the selection of the
clear NO LOGS policy with the VPN provider
Free VPN could reason the distribution of data with the 3rd parties
Part (c)
The main convenience and the security weaknesses for any home user utilising the VPN for
any private browsing could be categorised as:
Online speed could be immensely slowed down with the utilisation of the VPN
Quality VPN services could be discovered as the paid service
The choice of VPN is essential due to the fact that any wrong VPN could cause
significant insecurity of the user
The devices that are being used could not support the VPNs
Advanced Network Security Page 6 of 6
The logs are used for the recording of connection and this leads to the selection of the
clear NO LOGS policy with the VPN provider
Free VPN could reason the distribution of data with the 3rd parties
Part (c)
The main convenience and the security weaknesses for any home user utilising the VPN for
any private browsing could be categorised as:
Online speed could be immensely slowed down with the utilisation of the VPN
Quality VPN services could be discovered as the paid service
The choice of VPN is essential due to the fact that any wrong VPN could cause
significant insecurity of the user
The devices that are being used could not support the VPNs
Advanced Network Security Page 6 of 6
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.