This document provides an overview of advanced network and infrastructure security topics. It covers protocols, encryption techniques, risk management, and more. The document also includes references for further reading.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
[Document Title]1 Advance Network andInfrastructure Security TASK 1 1. Protocol – HTTP protocol does not encrypt all the communications and traffic between the client and the server. The communication could be sniffed by an attacker to get plain login credentials. Migrating to HTTPS would secure and encrypt all the communications between the client and the server. Password – All the passwords for both the mobile and the internet bank online should be highly encrypted using some form of a hashing algorithm. 2. The inputs are divided into blocks of data of fixed size. Each of the input is accepted by the hash function as parameters. The hash function is then used to generate values from the blocks of data. The values generated are the hashed text of data. 3. Required improvement. The current system could allow leakage of information through passwords that are not hashed and unencrypted network traffic. The credentials for both the mobile and the web are different. This is a poor management technique of storing data. The data needs to be normalized. 4. AES AND RSA.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
[Document Title]3 FIG: RSA FIG: AES 5. Brute force - a trial and error technique against a series of known hashes (Bernstein, 2005) Dictionary – use of a large set of word to check against the hashes.
[Document Title]4 6. Generalareas of risk – identify the major areas that are likely to affected by a risk occurrence. Ways of addressing the risk – identify ways in which the risks can be resolved. Auditing – auditing the systems to ensure compliance with the risk rules and guidelines. 7. Awareness – creating awareness among the members to inform about possible risks and mitigation techniques. Policies and guidelines Enforcement – Ensuring that the setup policies are adhered to.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
[Document Title]5 TASK 2 1. Transport mode is used for encrypting end to end communications while Tunnel mode is used to encrypting communication between gateways or an end station connected to a gateway. 2. 3. Crafting packets with an internet address that has been modified to impersonate a computer system. The header of the source address is different from that of the actual address. 4. A network mapper that is used to discover hosts and identify services of a computer system by sending a series of data packets and analyzing the response from the target system. 5. An implementation of a simple central server for authentication, authorization and accountability of logons enhanced by the use of routers and switches. The logons are managed by the network devices.
[Document Title]6 6. 3DES is a cryptographic algorithm that is used to encrypt and decrypt blocks of data using fixed lengths. 3DES applies DES three times during encryption (Singh, 2013). Both DES and 3DES uses the same key both the encryption and decryption process (Mandal, 2012). DES uses a key size of 56 bits during encryption while 3DES uses 18 bits. 7. An algorithm that is used during the operations of process such as encryption and decryption. The process is divided into a series of well define steps. Each of the given steps is followed as a procedure or a routine.
[Document Title]7 References Bernstein, D.J., 2005, May. Understanding brute force. InWorkshop Record of ECRYPT STVL Workshop on Symmetric Key Encryption, eSTREAM report(Vol. 36, p. 2005). Mandal, P.C., 2012. Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish.Journal of Global Research in Computer Science,3(8), pp.67-70. Singh, G., 2013. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19).