What is the actual running environment of tool

Assignment Help Computer Network Security
Reference no: EM13519818

Part -1:

1. What is the difference between a block cipher and a stream cipher?
2. List ways in which secret keys can be distributed to two communicating parties.

Part -2:

Consider a Feistel cipher composed of 16 rounds with block length 128 bits and key length 128 bits. Suppose that, for a given k, the key scheduling algorithm determines values for the first 8 round keys, k1 , k2 , . . . k8 , and then sets

Suppose you have a ciphertextc . Explain how, with access to an encryption oracle, you can decrypt c and determine m using just a single oracle query. This shows that such a cipher is vulnerable to a chosen plaintext attack. (An encryption oracle can be thought of as a device that, when given a plaintext, returns the corresponding ciphertext. The internal details of the device are not known to you and you cannot break open the device. You can only gain information from the oracle by making queries to it and observing its responses.)

Part 3:

Suppose an error occurs in a block of ciphertext on transmission using CBC. What effect is produced on the recovered plaintext blocks?

What is a one-way function?

Briefly explain Diffie-Hellman key exchange.

In an RSA system, the public key of a given user is e = 31,n= 3599. What is the private key of this user?

Part -4:

List four functions supported by S/MIME.

What is the purpose of HTTPS?

What are two ways of providing authentication in IPsec?


In SSL and TLS, why is there a separate Change Cipher Spec Protocol rather than including a change_cipher_spec message in the Handshake Protocol?

Part -5:

What are the principal elements of a Kerberos system?

What is the role of a CA in X.509?

Part -6:

List and briefly define IEEE 802.11 services.

What security areas are addressed by IEEE 802.11i?

In IEEE 802.11, open system authentication simply consists of two communications. An authentication is requested by the client, which contains the station ID (typically the MAC address). This is followed by an authentication response from the AP/router containing a success or failure message. An example of when a failure may occur is if the client's MAC address is explicitly excluded in the AP/router configuration.

a. What are the benefits of this authentication scheme?

b. What are the security vulnerabilities of this authentication scheme?

What effect does "setgid" have on directories? On files?

What is a rootkit? Why are they hard to detect?

Part -7:

Why are file system permissions so important in the Linux DAC model?

How do they relate or map to the concept of "subject-action-object" transactions?

Part -8:

1 What are the two kinds of ACLs in Windows, and what does each do?

2 Why does XBox Live use only IPSec and not IPv4?

Paige's (simplified) token looks like this:

User:
FOOCorp\PaigeH
Groups:
Everyone
Authenticated Users
Developers
Her word processor attempts to open a file for RWX access, and the
file has the following ACL:
Administrators: Full Control
Authenticated Users: RW
Developers: RWD
Will Paige be granted access to the object? Why or why not?

3. Practical Assignment:

(Note: You need to use a tool that is different from the one you used for assignment 2.)

General Description:

This practical assignment is intended for you to get familiar with some of the current security tools. These tools are powerful and are widely used in the security community. You may find some of the tools useful in protecting your own computer as well as computing resources within your organization. Special attention should be paid in choosing some of the tools and instructions should be followed.
1) Select a tool from "Top 100 Network Security Tools" (https://sectools.org/). The use of an open-source tool is highly encouraged.
I choose Cain and Abel

Cain and Abel

UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. For downloads and more information, visit the Cain and Abel homepage.

2) It is required that you install and run the tool in an enclosed network environment or use it on your own computer ONLY. An enclosed network environment means a non-operational networked system without any physical connection to other working computing environments (e.g., the Internet). Special attention should be paid when you use network scanners, sniffers, hacking tools or password crackers because their usage may violate an organization's security policies or compromise other computing resources. It is therefore your own responsibility to guarantee that the running of security tool(s) does not violate your organization's regulations, procedures, policies, and/or local, state and federal laws.

3) Follow the instructions to configure and run the tool you chose.

4) Write a brief report (2-3 pages, single-spaced, not counting quotations used). In your report, answer the following questions in your own words (please do not copy/paste from a tutorial or other online materials).

a) What is the functionality of the tool?
b) What is the actual running environment (software and hardware) of the tool?
c) How will you evaluate the tool based on your own experience?
d) In what aspects could the tool be improved?

5) Take a screenshot (usually by pressing Shift + PrintScreen) during the running of the tool and paste it in your lab report. In your lab report you can provide as many screenshots as you want and/or other output to show you have actually run the tool.

Reference no: EM13519818

Questions Cloud

Define the skeletal structure of the major organic product : Draw the skeletal structure of the major organic product produced when 2-methylpropanoyl chloride reacts with 3-methylbutanoic acid in the presence of the weak base, pyridine.
Calculate how large is the current in the heart : The body contains many small currents caused by the motion of ions in the organs and cells. Measurements of the magnetic field around the chest due to currents in the heart give values of about 1.0 µG. how large is the current in the heart
Explain the negative terminal of a voltmeter : Prepare an electrochemical cell by connecting the negative terminal of a voltmeter to a strip of zinc in a solution of 0.500 M ZnCl2(aq) and the positive terminal to a strip of copper in a solution of 0.100 M CuCl2(aq). The two half-cells are conn..
Entertain alternatives are usually good habits to cultivate : Experiments are designed to answer factual questions, not ethical questions. Italian scientists have successfully grown an embryo from a chimpanzee’s egg and human sperm. So, while this experiment answers a factual question, it also raises ethical..
What is the actual running environment of tool : What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?
Calculate the average kinetic energy of a helium atom : 7.4 mol of helium are in a 16 L cylinder. The pressure gauge on the cylinder reads 68 psi. calculate the average kinetic energy of a helium atom
Find the frequency heard by the listener : A sound source emits sounds of frequency 215 Hz that travel through still air at 340 m/s. Find the frequency heard by the listener
Explain the pka of the acid function at the 2-position : The pKa of the acid function at the 2-position is approximately 2, whereas that at the 1 position is about 3. Which of the 2 is more acidic and why
Calculate the volume flow rate in liters per minute : Blood flows in an aorta of radius 8.0 mm at 31 cm/s. Calculate the volume flow rate in liters per minute

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd