Create or deploy secure solutions which prevent sniffing

Assignment Help Computer Engineering
Reference no: EM132218859

Networked printers use a variety of protocols, the most common being IPP and LPR/LDP.

Few if any of these protocols support encryption and PCL and Postscript documents can be sniffed using a combination of readily available hardware and software.

The project has these aims:

1. Survey existing and proposed plain text and 'secure' network printer protocols and determione the extent of the problem.

2. Perform experiments on networked printers to confirm the ease and efficacy of sniffing printer traffic.

3. Create or deploy secure solutions which prevent sniffing or render sniffing useless.

4. Propose and test a low cost solution for small to medium sized businesses which will secure networked printer traffic.

5. Use a "throwing star hub" and software (Wireshark) to intercept and analyse printer traffic between users and "smart" photocopiers and printers. Inject control signals

Skills:

Programming, particularly with sockets.

Research, with attention to correct referencing and effective search and analysis skills.

Hardware, including ability to use simple networking devices for data interception.

Reporting skills.

Reference no: EM132218859

Questions Cloud

Briefly describe four advantages of a dbms : Briefly describe four advantages of a DBMS. Briefly describe an SQL DML statement for storing new data into a table.
Briefly providing a reason for your opinion : The following are a number of different situations where there may be violations of the ethical principles. You are asked to state whether.
Is positive beta better than negative beta : A Beta factor represents risk in a financial instrument or commodity. Explain the reasons for changes in beta and explain if one should be more concerned.
Would you invest in the treasury bill or treasury note : The daily market transactions for treasury instruments are in the billions. The current average daily volume of "Treasuries" is approximately $150 billion.
Create or deploy secure solutions which prevent sniffing : Propose and test a low cost solution for small to medium sized businesses which will secure networked printer traffic.
Explain the tax benefits of debt financing : The concept of after-tax Weighted Average Cost of Capital (WACC) is a common issue when studying finance at all levels. The impact of taxes, applicable to most.
Why common stockholders can demand a higher rate of return : Please briefly explain to the Board: 1) the usual collateral position of Bondholders (lenders) versus Equity investors, 2) why common stockholders can demand.
Discuss the principles presented by modigliani and miller : Before coming to that conclusion (as stated above), please discuss the principles presented by Modigliani and Miller and explain your agreement or disagreement.
Assess investment options based upon expected returns : The Assignment requires the application of the Net Present Value (NPV) model to assess investment options given cost of capital, commonly referred.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd