COMP 30019 Network Security Assignment

Assignment Help Computer Network Security
Reference no: EM132552260

COMP 30019 Network Security - Middle East College

Learning Outcome 1: Demonstrate an understanding of cryptography and digital signatures

Learning Outcome 2: Demonstrate an understanding of authentication requirements and applications

Learning Outcome 3: Design and Configure Microsoft Forefront Threat Management Gateway and implement network polices

Assignment Objective

Evaluate the students understanding of asymmetric cryptography for data encryption and digital signature. Also the students will evaluate different types of authentication mechanisms and requirements. Moreover, a practical part of designing and implementing TMG based on some security requirements.

Assignment Tasks

Task 1

Secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet, and confidential communications such as credit card transactions. One of the cryptography types is asymmetric cryptography that is used to provide data confidentiality and non-repudiation. One of the most common algorithm in this type is RSA. Assume the RSA algorithm parameters are ( p = 29, q = 23 and e =17)

a. Explain the process of securing the communication between two parties using asymmetric cryptography.

b. Using the given RSA parameters, Generate your key pairs for asymmetric cryptography.

c. Suppose Ali wants to send you the PIN cod = 124 confidentially. Discuss in details, how to exchange this PIN code by implementing RSA algorithm.

d. Explain how you will use asymmetric cryptography in a digital signature.

e. Critically evaluate the security attacks on asymmetric cryptography.

Task 2

Authentication is element of a typical security model. It is the process of confirming the identification of a user (or in some cases, a machine) that is trying to log on or access resources. There is a number of different authentication mechanisms, but all serve this same purpose.
a. Critically analyze any five user authentication mechanisms.
b. Critically evaluate the security threats for each authentication mechanism.

Task 3:

You are the network administrator for MACRO Company. The company has implemented Microsoft Forefront TMG as a security gateway. The company works 5 days a week (Sunday to Thursday) from 7am to 3pm. The company has the following requirements:

The Company management wants to implement Network Inspection System (NIS). The goal is to enable inspect all networks traffic except the traffic of administration servers, which does not require NIS traffic evaluation. Also, MACRO Company wants to configure intrusion detection system to detect the common attacks and DNS attacks. , UDP bomb and IP half scan attacks and all sorts of DNS attacks.

Implement the following tasks to meet the company's requirements and provide screenshots report for your implementation.

Task 3.a Configure network Inspection System (NIS) as following :

• Configure an exception named ‘admin_YOURNAME' (e.g: admin_ALI) for the NIS with IP addresses 192.168.20.18 to 192.168.20.28.
• Signature should be updated 48 times per a day.
• The NIS should alerting after 10 days if there is no update installed

• Anomaly signature need to be denied.
Task 3.b Configure an intrusion detection System (IDS)as following :

• The IDS should detect for Ping of death, UDP bomb and IP half scan attacks.
• Also it should detect all port scanning attacks whenever the number of attacks exceed 5 for well-known ports and 10 for all other ports.
• The IDS should detect all types of DNS attack.
• The IDS should detect the SYN flood attacks and UDP flood attacks
• The IDS should monitor any attempt of DoS attack
• The IDS should block any IP address that exceed 200 TCP connection

Attachment:- Network Security.rar

Reference no: EM132552260

Questions Cloud

What are the four categories of products contained : What are the four categories of products contained in the matrix that classifies products into one of four groups according to market share and market growth
How do company develop organizational capabilities : The company's organizational capabilities must focus on the business's ability to meet customer demand.
How do deduct the lease payment in order : Private company and it later becomes uncollectible, none of the assets are used in Active business, will the Allowable Business Investment Loss deduction apply?
Record the transaction in the books of the lessee : Record the transaction in the books of the lessee. Beginning December 30, 2019, JJI entered into a contract with Carlin's Inc. for the use
COMP 30019 Network Security Assignment : COMP 30019 Network Security Assignment Help and Solution, Middle East College - Assessment Writing Service - understanding of cryptography and digital signature
What measures would you take to ensure : As a personnel management specialist, what measures would you take to ensure there is stability in your work force.
Identify accounts within the chart of accounts : Which is a correct numbering system to identify accounts within the chart of accounts? 101-cash;201-accounts payable; 301-k.clarke;capital
Stackelberg market equilibrium price-output solutions : Taking the Cournot equilibrium output 800 (000) units) and Cournot equilibrium price of $450 - why do the Stackelberg equilibrium price-output solutions
When preparing a reversing entry may temporarily create : Although it may look unusual, when preparing a reversing entry you may temporarily create? a debit balance in an asset account.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How a risk-based audit may address these concerns

What is your understanding of how a risk-based audit may address these concerns and explain how you would describe to the management team the difference between a compliance and a substantive audit.

  How you would use the tool in the investigation

How you would use the tool in the investigation. How the tool helps the investigation and the evidence you expect it to provide.

  Demonstrate in the program

Write a Java program (non-GUI preferred) that has a method named atomic(). Demonstrate in the program how two threads can, sometimes, invoke atomic() concurrently. Create a second version of the program in which the two threads cannot invoke atomic c..

  Controls to detect or prevent salami attacks

List three controls that could be applied to detect or prevent salami attacks. Modularity can have a negative as well as a positive effect. A program that is overmodularized performs its operations in very small modules.

  How does active directory support network security

ISOL534 Provide an explanation of if/where/how does Active Directory support network security. The paper must be at least 10 pages (2,000-2,500) words.

  Review the sites terms of use and privacy policy

Review the site's terms of use and privacy policy, if any. Are these clear and easily understood, or are they written in legalese?

  Explain the most common forms of digital crime

Explain the most common forms of digital crime. Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

  The six principles of nclb

The six principles of NCLB

  List some desirable characteristics of an ids

List some desirable characteristics of an IDS. What is the difference between anomaly detection and signature or heuristic intrusion detection?

  Security management

Choose a topic from your major field of study. For example, if you pursuing a degree in education, your topic will come from the education field.

  Discuss whether private industry now has a responsibility

Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulation.

  Write a paper on the current attacks against web client

Write a one page paper on the current attacks against Web clients, such as Flash-based click-through attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd