Case studysource wwwsunnych author silvia hagen company

Assignment Help Computer Networking
Reference no: EM13349392

CASE STUDY
Source: www.sunny.ch Author: Silvia Hagen Company: Sunny Connection AG, Staubergasse 9, 8124 Maur / Switzerland The IP Version we are all using in our day, in our corporate networks and in the Internet, is IP Version 4, short IPv4. It has been expanded in the early seventies by a numeral of pioneers who desired to unite some educational and government networks in the United States. At the time when they started expansion, a network like our Internet today was beyond thoughts and consequently to meet such a requirement was not part of their design goals. All the more fascinating it is, that they administered to create a networking protocol, which is still - 30 years later - competent of running today's Internet! But now it has reached it's age and cannot be shoved any further. Time for the next generation to take over! When the Internet was switched overnight to use TCP/IP instead of the formerly used NCP in 1983, IPv4 was not exactly the protocol we know today. It was, in the core. But many of the extensions and additions that we use today have been expanded much later. The basics of IPv4 were defined in RFC (Request for Comment) 791 in 1981. Path MTU Discovery was defined in RFC 1191 in 1990. Super netting, which was designed to help easiness the issue with overloaded routing tables, was distinct in RFC 1338 in 1992. DHCP, which was designed to help administer the addresses in a larger IP network, was clear in RFC 1531 in 1993 and Private Addresses which we use to build our NATs (Network Address Translation) today were named in RFC 1597 in 1994.
The grounds I am mentioning this, is not to turn off your interest with numbers of papers that you never desire to read. What I would like to point out is that when IPv4 was first introduced, it was not the mature protocol we know today. Many of the extensions to IPv4 that help us supervise and maintain our IPv4 networks were introduced later, when the need arose. Based on the need, the additional rooms were distinct in the international working groups and defined as RFCs. So when people dispute today, that IPv6 is not mature and cannot do what IPv4 can, this is only partially true and above all, not a reason not to use IPv6. Development for IPv6 started in 1991. The central part of IPv6 was standardized in 1995 and updated in RFC 2460 in 1998. Based on that standard we have many implementations around since many years. Most hardware and router traders have implementations since the late nineties and have tested them intensely. 6to4, a main changeover mechanism, that makes co-existence and migration much easier, has been standardized in 2001. DHCP Version 6 has been harmonized in summer 2003. Mobile IPv6, which is going to be one of the technologies that make you decide IPv6 over IPv4, is in the process of being harmonized in early 2004. The equivalent is true for ISATAP, another example for a transition mechanism. IPv6 has been build up based on the rich experience we have with IPv4. IPv6 is an evolution of IPv4, it is mature in the core, it has been applied and tested powerfully up to the network layer. The developers produced a protocol, which takes everything that was great about IPv4 and added litheness to extend it, to make it the network protocol of the future. IPv6 is capable of handling the Internet growth rate and to hold up the new types of services, especially in the area of mobility that we have to expect in the coming years. There are things that we are missing in IPv6 these days that is true. But you do not need to switch today and all these additions will be defined in the coming years, just as it come about with IPv4. But you ought to become aware of how IPv6 will impact your commerce and your network. If you plan early, you will save money and headaches. You will be prepared when it is time for you and more importantly, you will be able to determine the right moment for not extending your IPv4 infrastructure anymore, but putting your speculations into the future technology.

QUESTION 1

a) "All the more enthralling it is, that they managed to create a networking protocol, which is still - 30 years later - capable of running today's Internet! But now it has reached it age and can't be shoved any further. Time for the next generation to take over!".
What are the two key reasons for the above declaration?

b) 10.1.0.3 is my IPV4 ip address.

i. Can you fit in this address in an IPV6 address arrangement?

ii. How will it look like after implanting the above V4 address?

c) "IPv6 has been developed based on the rich acquaintance we have with IPv4"
From the above we can say that IPV4 has been beneficial as well as detrimental to some major implementation. Elucidate in detail (with diagram where appropriate) four of the practical problems of IPV4

d) According to RFC 4291, explain the different types of addresses.

QUESTION 2

a) Before starting a network safekeeping design there are 12 important steps that a safekeeping specialist need to lay down as ensure list. Name ALL of them.

b) "DNS carry on to be a nice target for hackers. The ubiquity of BIND as DNS server software around the world, and the possibilities a hacker can be expecting should he succeed in taking over a server or simply use DNS implementation to reorient ate traffic, are some of the things which make DNS a basis of safekeeping issues."
Source: Extract from https://www.sans.org/reading_room/whitepapers/dns/safekeeping-issues-dns_1069

i. After reading the small haul out we note that DNS is indeed a very vital part of the internet. How does DNS work? Your respond must contain appropriate diagram to support your answer.

ii. To stop the above safekeeping issues, a new version of DNS came in.

1. Define the new technology that can be used to stop the above.

2. According to the new version of DNS, four new resource records were putting in and two new header flags. You are required to name and briefly clarify them.

QUESTION 3
a) A hacker will find all ways and means to attack a network. As a safekeeping forecaster you should be aware of the kind of attack a hacker can use and what vulnerabilities they are looking at in your network.
You are needd to explain the vulnerabilities that a hacker will to develop when performing the listed below attacks:

i. TCP SYN attack

ii. Ping of Death

iii. Land attack

iv. Teardrop attack

v. Smurf attack

vi. Fraggle attack

b) "Defence-in-Depth is an IA construct in which multiple, related, organizational acts and controls are applied to minimize failures and intrusions and their propagation.
In spirit, it is a multi-pronged protection strategy. When Defense-in-Depth is achieved, dependability and resilience-the ability of IT systems to withstand attacks with minimal impact on services- are also achieved. Defense-in-Depth can be broken down into constituent containers-conceptually defined areas that each focus on a particular aspect of the big picture, such as identity management or availability management. These element containers allow IT professionals to more easily appreciate the larger requirements and thereby identify appropriate actions and controls in the context of their own organizational environment." Elucidate the diverse components of Defense-in-Depth?

Question 4

a) "INCREASING THE HACKER'S WORK FACTOR". Shed light on this quote.

b) Case Study 2: confirmation of hacking was discovered on a web server with HIPAA data...

1. Client: Major Healthcare Company

2. Incident: After the unique web application development firm departed for a new venture, the newly hired web development firm discovered traces of facts from hacking groups.

a) - The web server had been compromised.

b) - The database and the web server were on the same physical server, and HIPAA regulated information was involved.

c) - The incident take place 4 months prior and over the course of a 5 day period, based on the preliminary findings of the new development firm.

d) - No logs were available other than the web server logs for those 5 days.

e) - The client needed to know the extent of the damage, and whether they were needed to take legal measures such as provide violate notification(s) and report the breach(s) to the attorney general.
Source: Extract from https://www.klcconsulting.net/cyber-safekeeping-case-studies/forensics-analysis.html after reading the above case study, we note that an attack has occurred and the objective machine is a web server. You are required to design and explain a network topology with the three network zone obviously labelled that would remediate to the above.

c) In the layered safekeeping model, there are safekeeping levels and related safekeeping measures. Name all of them.

Reference no: EM13349392

Questions Cloud

Part aquestion 1a product often consists of several : part aquestion 1a product often consists of several elements which the tourism marketer has to consider in order
Question 1terrorism is the use of aggression fear and : question 1terrorism is the use of aggression fear and threats for political ideological or social purposes. cyber
Partquestion 1a explain the non-monetary costs that : partquestion 1a explain the non-monetary costs that tourists may experience when purchasing a serviceproductb elaborate
Question 1a what is cyber terrorism amp information warfare : question 1a what is cyber terrorism amp information warfare in relation to?b what can be made on the subject of cyber
Case studysource wwwsunnych author silvia hagen company : case studysource www.sunny.ch author silvia hagen company sunny connection ag staubergasse 9 8124 maur switzerland
Part aquestion 1 service quality focuses on satisfying : part aquestion 1 service quality focuses on satisfying customers needs in the moments of truth during service
Case studythe ip version we are all using nowadays in our : case studythe ip version we are all using nowadays in our corporate networks and in the internet is ip version 4 short
Question 1marriott isla verde beach resort located on : question 1marriott isla verde beach resort located on beautiful isla verde beach proud recipient of the blue flag beach
Part bquestion 1case study holiday innholiday inn claims to : part bquestion 1case study holiday innholiday inn claims to be the worlds most global hotel company and has created

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss functionality of component of network

Discuss the functionality of each component and the role the components play in the operation of the network and the Internet.

  Describe effects of spyware and adware-security of internet

Describe the effects of spyware and adware. How has spyware and adware influenced public's confidence in security of the Internet?

  Receiving uart transfering incoming character to buffer

How long [in micro-seconds (µs)] does receiving UART have to transfer an incoming character to buffer or to the main computer before next character arrives?

  Kind of challenges did irs encounter when implementing cdw

What kind of challenges did the IRS encounter when implementing its CDW? What management,organization, and technology issues had to be addressed?

  Determine minimum number of bits for sequence number

Suppose that each frame carries 1Kbytes of data, determine minimum number of bits you require for the sequence number?

  Snmp security

SNMPv1 is the most commonly used version of SNMP even though it provides little support for security. Why not change to another version of SNMP?

  Describe the imap protocol

List and illustrate 5 RFCs that describe the IMAP protocol. Print and read the first two pages of one of these RFCs.

  Advantages of using extranet instead of private phone lines

Write down the benefits of using extranet instead of dedicated/private phone lines in this situation? How do you expect your customers restaurants to react to change to extranets?

  Complete one paper summarizing the actions steps tools etc

complete one paper summarizing the actions steps tools etc. of the hacking techniques used to execute the attack on the

  What would be the utilized the best in todays industry

Which of the security enhancements do you think is the most important, and why and dDiscuss your thoughts on what would be the utilized the best in today's industry. Do you feel it is ground-breaking technology?

  How can p2p file-sharing networks make money

What social issues are raised by P2P file-sharing protocols and programs such as BitTorrent? Is the record industry justified in attempting to shut them down? Why or why not?

  Explain the role of client - server

Identify and describe the processes involved in the Windows Client Server environment - Explain the role of client/server in the networking environment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd