This document is the submission for Assignment 2 of COIT20262 - Advanced Network Security course. It includes questions on HTTPS and Certificates, Authentication and Access Control, Firewalls and iptables, and Internet Privacy.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
COIT20262Assignment 2 SubmissionTerm1,2019 COIT20262-Advanced Network Security, Term1,2019 Assignment 2 Submission Due date:5pm Friday 7 June 2019 (Week 12)ASSESSMENT Weighting:45% 2Length:N/A Student Name:enter your name Student ID:id Campus:campus Tutor:tutor Advanced Network SecurityPage1of6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262Assignment 2 SubmissionTerm1,2019 Question 1.HTTPS and Certificates Part (d) What hash algorithm is used to generate the certificate signature? Whatencryptionalgorithmisusedtogeneratethe certificate signature? Howmanybytesisthepublickeymodulusinthe certificate? In the TLS cipher suite used between client and server, what algorithm is used for: -Encrypting session data? -Hashing for the MAC? -Key exchange? How many bytes of random data are sent from the client to server at the start of the handshake? Part (e) Write your answer here Advanced Network SecurityPage2of6
COIT20262Assignment 2 SubmissionTerm1,2019 Question 2.Authentication and Access Control Part (e) Write your answer here Part (f) Write your answer here Part (g) Write your answer here Advanced Network SecurityPage3of6
COIT20262Assignment 2 SubmissionTerm1,2019 Question 3.Firewalls and iptables Part (a) Include screenshot here. (Do not submit the file separately) Part (b) Include screenshot here. (Do not submit the file separately) Part (c) Include screenshot here. (Do not submit the file separately) Part (d) Include screenshot here. (Do not submit the file separately) Part (f) Write your answer here Part (g) Write your answer here Part (h) Write your answer here Advanced Network SecurityPage4of6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COIT20262Assignment 2 SubmissionTerm1,2019 Question 4.Internet Privacy Part (a) The main working of web proxy server could be analysed as gateway among internet as well as the client and it performs the separation among the client from any website that is surfed by them. The main intention of using the proxy is to provide the various levels of extensive privacy, security along with privacy relying on all the requirement and the policy of organisation. In the situation of utilising proxy servers, the flow of the traffic through the proxy for reaching the designated address. Throughout the major utilisation of the proxy server, any user is required to construct the settings of the browser and then provide the IP address as well as the port number of that proxy server that is available under the choice of Manual Proxy Configuration”. Proxy servers could be utilised for the various kinds of safekeeping like: Maintenance of extensive anonymity by the hiding of authentic IP address Maintenance of distortion by creation of improper IP address accessible by the utilisation of the http header MaintenanceofsignificanttransparencybycreationoftheuniqueIPaddress accessible with utilisation of the headers of http Someofthespecificsecurityandtheconveniencerestrictionsofproxyare categorised as: In some situations, the secured password and the data could be managed in the cache structure and monitored by the service provider Proxy servers could be exploited for retrieving the obstructed websites and frequently, these obstructed websites might be significantly invasive and it could lead to harm to that system where the blocked website are accessed from. Part (b) VPN could be used by the users for gaining these benefits: Extensive encryption of the internet traffic Maintain the anonymous mode while accessing the various browsers Prevention of the throttling of the bandwidth Significant avoiding of the censorship of internet The secure access of the internet regardless of the kind of the network (Private or public) With the proper utilisation of the VPN, the users could gain the benefit of accessing information remotely from any location that allows the proper accessing of content if there are any restrictions on the website. The major restrictions of the VPN over the web proxy could be categorised as: Significant capital is required for accessing the VPN services It could immensely slow down swiftness of the internet as it suggests more than just any server Advanced Network SecurityPage5of6
COIT20262Assignment 2 SubmissionTerm1,2019 The logs are used for the recording of connection and this leads to the selection of the clear NO LOGS policy with the VPN provider Free VPN could reason the distribution of data with the 3rdparties Part (c) The main convenience and the security weaknesses for any home user utilising the VPN for any private browsing could be categorised as: Online speed could be immensely slowed down with the utilisation of theVPN Quality VPN services could be discovered as the paid service The choice of VPN is essential due to the fact that any wrong VPN could cause significant insecurity of the user The devices that are being used could not support the VPNs Advanced Network SecurityPage6of6