Describe how the encapsulated security header protocol, Computer Network Security

Assignment Help:

Question:

(a) Give 2 benefits of using IPsec.

(b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (ESP). Why is AH required with ESP even though ESP provides authentication?

(c) Describe how the Encapsulated Security Header protocol (ESP) can be used to provide traffic analysis confidentiality using IPSec.

(d) What is a Security Association (SA) and what does it define? Why are there two SAs per one connection? How can two communicating peers agree on what kind of SAs they use?

(e) List two types of firewall that can be used.

(f) Describe the following threats to firewalls:
(i) Denial of service,
(ii) IP Spoofing and

What countermeasures can be adopted against these threats.

(g) What is a honey pot and why is it commonly used?


Related Discussions:- Describe how the encapsulated security header protocol

Efforts of advanced research project agency, ADVANCED RESEARCH PROJECT AGEN...

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa

Direct indexing, DIRECT INDEXING It is less usually known method. It i...

DIRECT INDEXING It is less usually known method. It is possible only is cases where protocols address are given from a compact range. In the diagram below an example of direct

Ids response behavior, IDS RESPONSE BEHAVIOR Once IDS detects an anomalo...

IDS RESPONSE BEHAVIOR Once IDS detects an anomalous network situation, it has a number of options. IDS responses to external stimulation can be classified as active or passive.

Bus topology, BUS TOPOLOGY In a bus topology all devices are attached ...

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Issue-specific security policy (issp), Issue-Specific Security Policy (ISSP...

Issue-Specific Security Policy (ISSP) The ISSP addresses specific areas of technology, needs frequent updates and having statement on organization’s position on a particular iss

#title., differentiate between internet and www

differentiate between internet and www

Draw the network layout, Question : a) Below is a capture of an Etherne...

Question : a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the source I

Describe the time limit problem, Problem: (a) Use a simple example to ...

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

Define secure socket layer (ssl), Secure Socket Layer (SSL) accepts a combi...

Secure Socket Layer (SSL) accepts a combination of asymmetric and symmetric (public-key) encryption to accomplish integrity, confidentiality, authentication and non-repudiation for

Asset identification and valuation-information security, ASSET IDENTIFICATI...

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd