Question 1broadly sort and discuss the types of safekeeping

Assignment Help Computer Networking
Reference no: EM13349383

QUESTION 1

Broadly sort and discuss the types of safekeeping that exists in communications?

QUESTION 2

a) Briefly confer the 3G Safekeeping model.

b) What are the main disparities between the 3G and GSM safekeeping models.

c) Interception within a 3G network can be quite problematic, as we know it. Regardless of that it is important to know how interception happens in such a network. Discuss about the concept and how this is attained.

d) In relation to interception on a 3G network what can be done to secure such hole in the organization.

QUESTION 3

Mobile wireless networks have transformed enterprises and generally how we communicate, freeing end-users from ties to a desktop computing setup and allowing them to be far more productive. A truly mobile network would have a significant advantage with the flexibility to shift strategies and being more competitive.
However, what's been missing from the idea of a mobile enterprise is a method to substantively evaluate the end-to-end safekeeping of such networks. There has been no truly reasonable way to accurately review every safekeeping aspect of a network and provide IT professionals with solutions that identify and correct safekeeping shortfalls.
You are hired as a safety Expert to provide a framework, which would be based around the foundation for safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, which tenders a result to this problem. The framework as we know should deliver a comprehensive methodology for assessing and upgrading end-to-end network safekeeping across the network. You will be playing a big role in helping bring secure connectivity to enterprises and government agencies with an understanding that to be truly effective, end-to-end safekeeping considerations must be evaluated and properly implemented at every stage of a network's lifecycle.
Admittedly, performing a inclusive safekeeping evaluation is a complex undertaking. Your sanctuary Framework should make it possible to evaluate one of the most vulnerable aspects of any infrastructure - in this case mobile - which is the air link. Furthermore, IT professionals should be able to determine if data travelling across that link is passably defended and, if not, what steps to take to assist in rectifying the situation.

The Reference Architecture

1482_safekeeping model.png

The orientation architecture for this assessment is based on a typical Wi-Fi network used by enterprises and hot spot service providers and includes a set of access points (AP), network admission controller (NAC) and authentication server (AS) as shown in stature 1.

The AP supplies wireless access to laptops, PDAs (personal digital assistants), and other mobile stations. It also supplies these devices with in sequence about the WLAN and responds to demand from them.

The main purpose of the Network Access Controller (NAC), commonly referred to as a "WLAN Gateway," is to perform or assist with user confirmation and to control network access. The NAC will not permit access to the network behind it unless the mobile station has been successfully authenticated and sanctioned.The NAC may put together other functions, including NAT (network address translation), DHCP (dynamic host configuration protocol) server, authentication server, and VPN server, etc.
The confirmation server is critical to implementing advanced safekeeping criterions such as 802.1x, WPA, and 802.11i/Robust Secure Network (RSN). It is responsible for user verification and authorization and can optionally participate in the key management. The remaining factors shown in the position architecture are common to wireless and wired networks.

Scope of the examination
The scope of the safekeeping analysis will include the end- to-end Wi-Fi network architecture and the entire framework from the ITU-T X805 should be functional, vulnerabilities should be identified for every layer, plane and dimension. For the sake of simplicity, the scope of analysis in your reacts should be limited to wireless admittance only. All applications running on top of Wi-Fi access with other enabler services such as DNS, DHCP, AAA etc., should be ruled out from the scope of your analysis.
a) Every type of Wi-Fi attack poses one or more threats, depending on intent and approach. Map down five popular Wi-Fi attacks to the threat model based on the ITU-T X805 Safekeeping Framework.
b) Scrutinize the impact on WIFI Layers.
c) Scrutinize the impact on the WIFI Planes.
d) Briefly illustrate the 8 safekeeping dimensions
e) Consider the effectiveness or the sufficiency of the controls available in each of the eight dimensions for all applicable modules in an attempt to determine the relative potency and weak spots of 802.11i, WPA2, WPA and WEP safekeeping standards.

Reference no: EM13349383

Questions Cloud

Question 1a company needs to consider its marketing mix in : question 1a company needs to consider its marketing mix in order to meet its customers needs effectively. explain the
Question 1a describe the term digital evidenceb when : question 1a describe the term digital evidence.b when thinking about the many sources of digital evidence it is often
Question 1case studythe virgin group the virgin group is : question 1case studythe virgin group the virgin group is one of the worlds most recognised brands. conceived in 1970 by
Part aquestion 1a explain why it is important for companies : part aquestion 1a explain why it is important for companies to practice integrated marketing communications.b discuss
Question 1broadly sort and discuss the types of safekeeping : question 1broadly sort and discuss the types of safekeeping that exists in communications?question 2a briefly confer
Question 1a critically examine the scope of marketing : question 1a critically examine the scope of marketing analysis that a company needs to undertake in the development of
Question 1the government of mauritius has recently launched : question 1the government of mauritius has recently launched a new concept to give a new impetus to the tourism
Question 1in todays highly competitive business world it is : question 1in todays highly competitive business world it is needless to mention that the need for a retention plan of
Question 1a what is the disparity between encryption and : question 1a what is the disparity between encryption and hashing?b why is it not always probable to use a white

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  How company can back up and protect network data

Develop the disaster plan for selected organization which includes how you would suggest company back up and protect network data.

  Ipsec gives security at network layer

If IPSec gives security at network layer, why is it that security mechanisms are still require at layers above IP?

  Describe role of computer forensics-security in organization

Describe the role of computer forensics and security in the organizations. Explain the roles of computer forensics expert and computer security expert.

  Lan security in a network environment

Discuss today's Local Area Networks security issues related to peer-to-peer network, client /server network and virtualisation environment.

  Determine actual maximum channel capacity

Determine the theoretical maximum channel capacity (Kbps) of traditional telephone lines (POTS)? Will that be the actual maximum channel capacity?

  Develop a simple backbone and determine the total cost

Develop a simple backbone and determine the total cost (i.e., select the backbone technology and price it, select the cabling and price it.

  Question about tcp networking

A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se

  Identify and describe telecommunication components

Using the key terms from this topic, plan the network you would suggest and justify your choice of wired or wireless. Include in your discussion the components and type of network topology. Make sure you identify any assumptions in your design.

  Describe the methods to tackle and mitigate rf multipath

Describe the methods to tackle and mitigate RF multipath that impact to WLAN throughput. Explain the purposes of POE in WLAN design.

  What network hardware needed for networking project

You are to network a ten story building capable of supporting 100 computers on each floor. What network hardware will be needed to accomplish the networking project?

  Calculate rsa signature on long message by computing mod

Calculate RSA signature on long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd