Describe how to modify a nat router to prevent packets

Assignment Help Computer Networking
Reference no: EM13766754

Question 1:

You are the administrator for a tracking system application for a Human Resources (HR) Department that tracks different employee cases such as processing retirements or changing health benefits for ACME Inc.. There are different permissions that different members the HR Staff need to execute on the cases to perform their duties. The available permissions that may be accomplished for each case are:

Read a case - you can open a case and view the contents.
Create a case - you can make a new case and save it.
Update a case - you can open a saved case, make changes to it and save the changes.
Search a case - you can search for cases using criteria and get returned cases that match the criteria.
Delete a case - you can delete an entire case.
Assign a case - you can assign a case to someone else to be worked on.

I want to have a group of HR managers that can perform all of the functions. I want to also have a group of HR personnel that can do everything except for alter or delete cases. I want to have a group of HR personnel that can open and make changes to a case but only after it assigned to them. If an ACME employee calls the HR helpdesk with a problem, the HR personnel that answers the phone should be able to search for their case, look at its contents, and either make the appropriate changes or assign it to the group responsible for making the changes.

1. Out of Discretionary Access Control, Mandatory Access Control, and Role Based Access Control, which access control method is best at accommodating these permissions and why?

2. List all of the different groups you would make to accomplish the functions above along with the permissions that would be included in each group. Feel free to name all of the groups anything you like such as the HR Editors or HR Supervisors, etc.

Question 2:

You are charged with maintaining a legacy Web application. It is a publicly facing e-Commerce site that allows customers to search for and order commemorative memorabilia and souvenirs using credit or debit card through an HTTP interface. Even though the Web server software is outdated and is no longer supported, it has been extremely reliable and has supported all updates to the application. There is a publicly accessible search mechanism that allows you to pull up your previous order and payment information using other previous order information. To order souvenirs or memorabilia, you are required to search for the items you would like to order and submit your order request via a Web form. The customer service personnel login and are granted full access rights to the application and database to assist customers with any issues including ordering questions and credit card issues.

List and explain the attack surfaces for this scenario.

Question 3:

A bank wants to store the account number of its customers( an 8 digit number ) in encrypted form on magnetic strip ATM cards. Discuss the security of the following methods for storing the account number against an attacker who can read the magnetic stripe: (!) store a cryptographic hash of the account number; (2) store the ciphertext of the account number encrypted with the bank's public key using a public key cryptosystem; (3) store the ciphertext of the account number encrypted with the banks's secret key using a symmetric cryptosystem.

Question 4:

Consider the following security measures for airline travel. A list of names of people who are not allowed to fly is maintained by the government and given to the airline; people whose names are on the list are not allowed to make flight reservation. Before entering the departure area of the airport, passengers go through a security check where they have to present a government issued ID and a boarding pass. Before boarding a flight , passengers must present a boarding pass, which is scanned to verify the reservation . show how some one who is on the no fly list can manage to fly provided boarding passes can be printed online. Which additional security measures should be implemented in order to eliminate this vulnerability?

Question 5:

Explain four general means (factors) of authenticating a user's identity? Also give an example of a system that uses two of these factors together and a system that uses three of these factors together.

Question 6:

Dr.blahbah has implemented a system with a 8 bit random canary that is used to detect and prevent stack based buffer overflow attacks. Describe an effective attack against Dr.blahbah's system and analyze its likelihood of success.

Question 7:

Suppose you want to use an internet café to login to your personal account on a bank web site, but you suspect that the computers in this café are infected with software keyloggers. Assuming that you can have both a web browser window and a text editing window open at the same time , describe a schema that allows you to type in your user ID and password so that a keylogger, used in isolation of any screen captures or mouse event caputers , would not be able to discover your user id and password.

Question 8:

You are the system administrator for a provider that owns a large network(eg. At least 64000 ip address). Show how you can use SYN cookies to perform a DOS attack on a web server.

Question 9:

Describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

Question 10:

List and explain seven different types of biometric authentication. Give examples of how they could be used in a system to authenticate a user such as devices that exist or systems that could be put into place

Reference no: EM13766754

Questions Cloud

Define diversification and its necessity in risk management : 1. What steps can this company take to diversify its portfolio 2. Define diversification and its necessity in risk management
Dominant force in international relations : The Civil War and by the mid-20th century, the United States had become the dominant force in international relations. Some have argued that the United States' military functions as the world's police and write a thesis statement that is one to two..
What legal rights would nicole have : What legal rights (including remedies) would Nicole have against Michaels Copy Repair and Sales arising out of the above set of facts? Explain your answer. Include a discussion on the law of agency, contractual provisions, enforcement, remedies an..
Is forced air warmer effective in decreasing hypothermia : Is forced air warmer more effective in decreasing surgical hypothermia as compared to conventional warming of surgical patients?"
Describe how to modify a nat router to prevent packets : Describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.
Statement that returns columns from the products table : A column named Discount Amount that uses the previous two columns to calculate the discount amount and uses the ROUND function to round the result to 2 decimal places.
The composition of the solar system : Explain how the processes of plate tectonics act to make metals and minerals usable for us.
The value of a quality assurance department : The link between cost and quality in healthcare. Cite at least two studies conducted in the past five years supporting your response.
Identify type of evidence offered in support of argument : Identify and assess the type of evidence offered in support of the argument position. This will include identifying premises and conclusions.

Reviews

Write a Review

Computer Networking Questions & Answers

  Subnets broadcast address

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. The new subnet mask after the subnetting

  Write an executive summary of your system

Write an executive summary of your system in no more than 150 words on a separate page - Describe your application and its operation. If you have made assumptions, indicate them here. Justify every item that you have introduced in your design in a ..

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  Define the s-t cut on node capacitated network

How would one define the s-t cut on node capacitated network as opposed to the edge capacitated network, and how would one illustrate that analogue.

  Describe the security features available on a platform of

? describe the security features available on a platform of your choice for example linuxandroidmac os

  Explaining client-server environment

You are administrator of a client-server environment. What type of network would you install and how would pieces and components of this network relate to each other?

  Computer and technology

Assume a program has 510 bytes and will be loaded into page frames of256 bytes each, and the instruction to be used is at byte 377. Answer the following questions:

  An acceptable use policy aup is a much significant policy

an acceptable use policy aup is a very important policy within organizations to define acceptable employee behavior

  Risk analyses conducted by the internal federal c&a team

With the completion of the threat, vulnerability, exposure, and risk analyses conducted by the internal federal C&A team, your chief technology officer (CTO) has asked that the team transition to the evaluation of the technical, management, and op..

  Compute devices accommodated by t-type tdm line

Determine no. of foll. devices that could be accommodated by T1-type TDM line if 1% of line capacity is reserved for synchronization purposes.

  Design remote access plan which meets requirements

Design a remote access plan which meets requirements described so far. Your submission should include following. Details of your proposed remote access solution, including any hardware and/or software that would be needed.

  What is the ethernet standard used in such a vlan

Explain in detail with the help of diagrams the CSMA/CD media access control technique used in Ethernet and write a report on your observations analyzing the data collected in previous step.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd