Explain the security risk in case

Assignment Help Computer Network Security
Reference no: EM132467244 , Length: 1 Page

Case - I have a service from ISP as they are forwarding traffic to my corporate, but the IPs directed to my network is the ISP''s IPs. so I asked them to set x-forwarded (which mean to insert the source ip in the header instead of their ip), but they need to have ssl certificate of my corporate so they can decrypt the traffic and encrypt it again with the source ip of the original ip, not isp's IP address.

Required - Need to understand the security risk in this case, is there any risk, gif so what are they, what if there is an alternative option?

Reference no: EM132467244

Questions Cloud

What is your social style at work : What is your social style at work and how does it affect your work habits? Do you have different social styles depending on where you are and what your role is?
How much net income or loss would recorded : Determine If Sweet Catering had recorded transactions using the Accrual method, how much net income (loss) would they have recorded for the month of May?
What is the prevailing interest rate : What is the prevailing interest rate if a perpetual bond were to pay $100,000 per year beginning next year and costs $1,000,000 today?
Calculating the sum of the present values : You plan to analyze the value of a potential investment by calculating the sum of the present values of its expected cash flows. Which of the following
Explain the security risk in case : Need to understand the security risk in this case, is there any risk, gif so what are they, what if there is an alternative option
Which of the developmental characteristics are familiar : Which of these developmental characteristics are familiar? Which are new? Which of these characteristics would I like to explore more closely?
What is amy return on investment as a percentage : What is Amy's return on investment as a percentage? Please provide the answer as a percentage to two decimal places, and include your units.
Perform an in depth analysis : What type of budget requires a facility manager to perform an in depth analysis of all line items and meticous,y justify all expenditures?
Determine legislated payments on termination of employment : Determine legislated payments on termination of employment required for each jurisdiction. In addition to the required payments on termination

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  Explain differences between the types of network securities

Explain the differences between the types of network security offered by the banks in the case. Which bank would you open an account with and why?

  Identify two competing security products

Identify two competing security products such as antivirus software, firewall, anti-spyware, or any hardware

  Write a page scenario in which a malware attack occurs

Detail the particular malware, the exploited vulnerability, and its attack vector in your scenario.

  Securing system using iptable firewall

You have to discuss the main use, limitations, and possible security holes of your firewall and write it in your report - discuss the advantages and disadvantages of firewalls with iptables and make suggestions to overcome the disadvantages in your ..

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  Analyze the existing security situation in the organization

Analyze the existing security situation in the organization. Identify the predominant electronic and physical threats to communications networks. Explain the importance of explicit enterprise security policies and procedures.

  What is happening now in terms of privacy on the web

Privacy on the Web: What is happening now in terms of privacy on the Web? Think about recent abuses and improvements.

  Address of the router that computer

1. Your boss wants to know the address of the router that his computer is using. What do you tell him?

  How does the human factor influence software development

MSDL 836 Security Architecture and Design Assignment - Paper on How does the human factor influence software development

  Discuss the business goals and constraints

Discuss some of the key considerations in designing a network design strategy. What approaches have worked for you in your present role or would you propose.

  Develop intellectual property violation reporting procedures

Develop intellectual property violation reporting procedures and Develop intellectual property infringement ramifications

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd