Question 1broadly sort and discuss the types of safekeeping

Assignment Help Computer Networking
Reference no: EM13349383

QUESTION 1

Broadly sort and discuss the types of safekeeping that exists in communications?

QUESTION 2

a) Briefly confer the 3G Safekeeping model.

b) What are the main disparities between the 3G and GSM safekeeping models.

c) Interception within a 3G network can be quite problematic, as we know it. Regardless of that it is important to know how interception happens in such a network. Discuss about the concept and how this is attained.

d) In relation to interception on a 3G network what can be done to secure such hole in the organization.

QUESTION 3

Mobile wireless networks have transformed enterprises and generally how we communicate, freeing end-users from ties to a desktop computing setup and allowing them to be far more productive. A truly mobile network would have a significant advantage with the flexibility to shift strategies and being more competitive.
However, what's been missing from the idea of a mobile enterprise is a method to substantively evaluate the end-to-end safekeeping of such networks. There has been no truly reasonable way to accurately review every safekeeping aspect of a network and provide IT professionals with solutions that identify and correct safekeeping shortfalls.
You are hired as a safety Expert to provide a framework, which would be based around the foundation for safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, which tenders a result to this problem. The framework as we know should deliver a comprehensive methodology for assessing and upgrading end-to-end network safekeeping across the network. You will be playing a big role in helping bring secure connectivity to enterprises and government agencies with an understanding that to be truly effective, end-to-end safekeeping considerations must be evaluated and properly implemented at every stage of a network's lifecycle.
Admittedly, performing a inclusive safekeeping evaluation is a complex undertaking. Your sanctuary Framework should make it possible to evaluate one of the most vulnerable aspects of any infrastructure - in this case mobile - which is the air link. Furthermore, IT professionals should be able to determine if data travelling across that link is passably defended and, if not, what steps to take to assist in rectifying the situation.

The Reference Architecture

1482_safekeeping model.png

The orientation architecture for this assessment is based on a typical Wi-Fi network used by enterprises and hot spot service providers and includes a set of access points (AP), network admission controller (NAC) and authentication server (AS) as shown in stature 1.

The AP supplies wireless access to laptops, PDAs (personal digital assistants), and other mobile stations. It also supplies these devices with in sequence about the WLAN and responds to demand from them.

The main purpose of the Network Access Controller (NAC), commonly referred to as a "WLAN Gateway," is to perform or assist with user confirmation and to control network access. The NAC will not permit access to the network behind it unless the mobile station has been successfully authenticated and sanctioned.The NAC may put together other functions, including NAT (network address translation), DHCP (dynamic host configuration protocol) server, authentication server, and VPN server, etc.
The confirmation server is critical to implementing advanced safekeeping criterions such as 802.1x, WPA, and 802.11i/Robust Secure Network (RSN). It is responsible for user verification and authorization and can optionally participate in the key management. The remaining factors shown in the position architecture are common to wireless and wired networks.

Scope of the examination
The scope of the safekeeping analysis will include the end- to-end Wi-Fi network architecture and the entire framework from the ITU-T X805 should be functional, vulnerabilities should be identified for every layer, plane and dimension. For the sake of simplicity, the scope of analysis in your reacts should be limited to wireless admittance only. All applications running on top of Wi-Fi access with other enabler services such as DNS, DHCP, AAA etc., should be ruled out from the scope of your analysis.
a) Every type of Wi-Fi attack poses one or more threats, depending on intent and approach. Map down five popular Wi-Fi attacks to the threat model based on the ITU-T X805 Safekeeping Framework.
b) Scrutinize the impact on WIFI Layers.
c) Scrutinize the impact on the WIFI Planes.
d) Briefly illustrate the 8 safekeeping dimensions
e) Consider the effectiveness or the sufficiency of the controls available in each of the eight dimensions for all applicable modules in an attempt to determine the relative potency and weak spots of 802.11i, WPA2, WPA and WEP safekeeping standards.

Reference no: EM13349383

Questions Cloud

Question 1a company needs to consider its marketing mix in : question 1a company needs to consider its marketing mix in order to meet its customers needs effectively. explain the
Question 1a describe the term digital evidenceb when : question 1a describe the term digital evidence.b when thinking about the many sources of digital evidence it is often
Question 1case studythe virgin group the virgin group is : question 1case studythe virgin group the virgin group is one of the worlds most recognised brands. conceived in 1970 by
Part aquestion 1a explain why it is important for companies : part aquestion 1a explain why it is important for companies to practice integrated marketing communications.b discuss
Question 1broadly sort and discuss the types of safekeeping : question 1broadly sort and discuss the types of safekeeping that exists in communications?question 2a briefly confer
Question 1a critically examine the scope of marketing : question 1a critically examine the scope of marketing analysis that a company needs to undertake in the development of
Question 1the government of mauritius has recently launched : question 1the government of mauritius has recently launched a new concept to give a new impetus to the tourism
Question 1in todays highly competitive business world it is : question 1in todays highly competitive business world it is needless to mention that the need for a retention plan of
Question 1a what is the disparity between encryption and : question 1a what is the disparity between encryption and hashing?b why is it not always probable to use a white

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd