What is utc and why is it used

Assignment Help Computer Network Security
Reference no: EM13693021

Question 1:

Onmodern networked computers, maintaining the correct time on each machine is important. Computers on a LAN or WAN with different times can cause problems.

In about a page and in your own words explain why it is important for computers to maintaining the correct time and more importantly explain how do they do it.

In your explanation make certain to include discussions on the following linked topics:

• The computer's hardware clock (also called the Real Time Clock or RTC)

• The computer's software clock (also called the kernel or system clock)

• In Linux, how they are syncronised and why do they need to be syncronised? Which is more accurate (with NTP and without NTP)?

• What is UTC and why is it used? (UTC: Coordinated Universal Time, or Temps Universel Coordonné, and if you want-you can explain what is going on with the acronym!)

• What is NTP and what are "clock strata"?

Question 2:

Auser comes to you and explains that she needs some formof encrypted file system to store sensitive information on a Flash drive. The Flash drive will be used to transport the sensitive data between work and home and she is worried about losing the drive and having the data stolen. Both machines, the one at home and the one at work, use the same Linux OS.

She has the following requirements:

• She does not want to encrypt individual files as she has to deal with a large number of files.
• She wants it to be as transparent as possible.
• She thinks she will only need about 128MB at most.
• She wants to also use the flash disk for transporting unencrypted files. Files that can be read on machines apart from her work and home machines.

A 128MB file that contains an encrypted file system, stored on the Flash drive would appear to be ideal-

a. Create a 128MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

Document and explain in your own words every command you use (plus any command line options) and any configuration files you modify or create. Your descriptions of each operation need to show you understand the purpose of the operation.

Note: If you are uncertain why a particular command or command line option is required-ask! There is at least one step and command line option that you cannot understand from the information in the man page alone! It will require some research and reading up on loop devices and the device mapper.

b. Things you must also address and explain:

• how to ensure that the Flash drive has exactly the samemount point each time it is used on differentmachines.

If it does not have the same mount point then how do you configure the hardwired cryptmount paths?

Hint: Experimentwith "labelled" file-systems (see the command e2label or dosfslabel) or UUIDs in conjunction with the file /etc/fstab

• how to securely manage the file-system encryption keys.

c. Write an instruction sheet for the user so that she can make the modifications to her home machine so that she can access the file on the flash drive containing the encrypted file system. Also explain how she would use the filesystem in her day to-day work.

You may assume that she has root access to be able to configure her home machine so she can mount the encrypted file-system.

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve dæmon that is supplied with SVN (please note that this is not the most secure way to access an SVN repository)

Install the distributed revision control system subversion from the Debian package of the same name. After installation you will need to configure subversion to be usable.

Tasks that will need to be done:

a. Install the subversion package.

b. Write and install a systemd service file to automatically start and stop svnserve (the subversion server) at boot/shutdown (in dæmon mode- do not use inetd mode, do not use an ssh encrypted tunnel).

c. Create an SVN repository at /var/lib/svn/

d. Configure the repository and define the repository usernames and passwords.

e. Implement configuration and runtime options that increase security-explaining why your choices increase security.

f. Test your configuration, repository and running server by creating a project in the repository. Show that you can check in and check out documents from the repository.

Verified Expert

Reference no: EM13693021

Questions Cloud

Evaluate the radius of curvature of the mirror : A virtual image of magnification +3.0 is produced when an object is placed 7.4cm in front of a spherical mirror, Find the radius of curvature of the mirror
Calculate the change in enthalpy : Problem- Part 1) Calculate the change in enthalpy, in kJ, for the combustion of 6.75 moles of C6H14 in oxygen. Report your answer in scientific notation (X.XXEX) with three significant figures. Do not include units in your answer. The enthalpy of ..
Find what is the focal length when it is in oil : A lens made of fused quartz (n = 1.46) has a focal length of +50cm when it is in air. What is the focal length when it is in oil
Evaluate the focal length when lens is submerged in water : A converging glass lens with an index of refraction of 1.54 has a focal length of 28cm in air. What is the focal length when the lens is submerged in water
What is utc and why is it used : How they are syncronised and why do they need to be syncronised and what is UTC and why is it used?
What is its momentum : A 2.09-g particle moves at 1.85 × 108 m/s. What is its momentum
Determine the voltage : Determine the voltage
What is the height of the building : A small rock is thrown from the roof of the building with a speed of 20 m/s at an angle of 37 degrees above the horizontal. What is the height of the building
What is the kinetic energy of an electron in the beam : You use an electron microscope in which the matter wave associated with the electron beam has a wavelength of 0.0349 nm. What is the kinetic energy of an electron in the beam

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  The network administrator to protect the network against

over the past several years the chief executive officer of your company has read articles on internet control message

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  Describe malicious things over a computer network

Suppose Ali and Jim are sending packets to each other over a computer network. Suppose Thomas positions himself in the network so he can capture all packets sent by Ali and send whatever he wants to Jim; he can also capture all the packets sent by..

  Implement the s-box functionality as a class

Implement the cipher as a class which implements the provided interface.

  Importance of maintaining the secure computing environment

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

  Etherpad shared document editing system

Etherpad shared document editing system and community version of the Alfresco Enterprise Content Management System

  What factors might an organization consider

What factors might an organization consider when choosing to implement an AD-integrated DNS zone versus a traditional zone? Describe a scenario in which it would be preferable

  Effective biometric systems

Discuss why are many of the reliable, effective biometric systems perceived as intrusive by users and what are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?

  How network security be customized for risks management

If not, how can one of these network security best practices be customized to requrements or risks present in the organization? How are risks to particular organization discovered or established?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd