Why is the authentication header mode ipsec incompatible

Assignment Help Computer Network Security
Reference no: EM13713392

1. Why is the authentication header (AH) mode of IPSec incompatible with network address translation (NAT) schemes?

2. A corporation wishes to establish secure communications between 2 of its branches over the Internetusing a virtual private network. Confidentiality and integrity of the exchanges must be protected at all times. In addition, the chosen scheme must protect against traffic analysis and replay attacks.  Make some recommendations about how you would implement IP-level security for this use case.Indicate how you would configure the corporate machines (internal machines, gateways, firewalls), and which IKE Security Associations would be necessary. Also indicate which key materials are needed and how they are distributed/acquired.

3. Your company wants to protect its WLAN againsteavesdropping and traffic injection. In addition, your company wants to reduce the risk ofconnecting to an evil twin access point (an unauthorized AP masquerading as an authorized AP by beaconing the WLAN's service set identifier (SSID) to lure users). Your company uses X.509 certificates authentication in its remote access VPN and would like to re-use those credentials on its WLAN.

Whichsecurity measures would you recommend adopting? Please specify which wireless security protocols and which type of Extensible Authentication Protocol should you choose for use with 802.1X?

4. An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check, and what changes, if any, are permissible to each.

It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.

5. Can a stateless firewall prevent against probing a specific port without preventing all communication to that port? Why or why not?

6. A corporation wishes to offer a web product for the first time. They need Web (http) services, ftp and mail. In addition, they want to use H.263 video streaming for conferencing.

Design a DMZ with firewalls that provides the best possible protection. Explain which type(s) of firewall you are using and why. Specify all the firewall rules similar to Table 12.1 or 12.2 in your textbooks. Give a general description of your design and explain any issues or problems.

7. Consider the following email message:

MIME-Version: 1.0

From: Bob <[email protected]>

To: Alice <[email protected]>

Date: Fri, 07 Oct 2014 16:15:05 -0700 (PDT)

Subject: Important reminder

Content-Type: application/pkcs7-mime; smime-type=enveloped-data;

name=smime.p7m

Content-Transfer-Encoding: base64

Is it possible for Darth to intercept and read the message? Explain?

8. Consider the following email message:

Is it possible for Alice to prove that indeed Bob sent that message to her? Explain?

Reference no: EM13713392

Questions Cloud

Examine apple''s current position on the company : 1. Examine Apple's current position on the company's ethical and social responsibilities, and determine whether or not the company has met these responsibilities. Provide two (2) examples that support your position.2. Determine the impa..
What was the average power output : 2152622 results for On December 27, 2004, astronomers observed the greatest flash of light ever recorded from outside the solar system. What was the average power output
Concept of audience in general and specific questions : Understanding "audience" is critical to achieving what you want. This quiz is designed to get you thinking about both the concept of audience in general and specific questions related to a product/service of your choice, what demographic you wo..
Determine the thickness of the oil film : A film of oil that has an index of refraction of 1.45 rests on an optically flat piece of glass of index of refraction n = 1.60. Determine the thickness of the oil film
Why is the authentication header mode ipsec incompatible : Design and explain any issues or problems - Why is the authentication header (AH) mode of IPSec incompatible with network address translation schemes
What is the acceleration due to gravity on that planet : If I weigh 741 N on Earth at a place where g = 9.80 m/s2 and 5320 N on the surface of another planet, What is the acceleration due to gravity on that planet
What does the rock weigh on planet : When venturing forth on Planet X, you throw a 4.79kg rock upward at 11.8m/s and find that it returns to the same level 1.64s later.  What does the rock weigh on Planet
How many excess electrons must be added : How many excess electrons must be added to an isolated spherical conductor of diameter 39.0cm to produce an electric field of 1105N/C just outside the surface
How many interference maxima can be observed : The 633 nm from a helium-neon laser is shone normally on a plane containing two slits. How many interference maxima can be observed

Reviews

Write a Review

Computer Network Security Questions & Answers

  Importance of maintaining the secure computing environment

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

  Classify this vulnerability using the risos model

The time-to-expire field is set at 0.5 because the administrator believes that this field unit is minutes (and wishes to set the time to 30 seconds) However, bind expects the field to be in seconds and reads the value as 0 - meaning that no data i..

  What is the total number of public key

An organization has 100 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages.

  What are the risks of implementing this technique

list one way to prevent malware from executing in Windows from directories that are not normally used for executables. What are the risks of implementing this technique?

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Define cybercrimes and computer security

Evaluate how teamwork and leadership are effective tools for financial forensic investigations. Provide support for your evaluation.

  What can employees do to protect against attacks

What can employees do to protect against intrusion and attacks? Complete the following for this assignment:Research various security tools that an employee can use to keep his or her data safe or to thwart denial of service attacks.

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

  Case study on byod

Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

  Network management in network management why is it

network management in network management why is it important to carefully consider decisions that will lock the firm

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd