Discuss the required changes in the network infrastructure

Assignment Help Basic Computer Science
Reference no: EM131310070

Suppose the Drib wished to allow employes to telecommute. In order to protect the network, they require all remote connections (other than those for the Web and mail servers) to use SSH.

a. Discuss the required changes in the network infrastructure. In particular, should the outer firewall provide an SSH proxy or a packet filter to incoming SSH connections? Why?

b. The destination of an SSH connection from the Internet might be the address of any host on the internal network. Such addresses, however, are not broadcast to the Internet and in fact may be addresses that routers on the Internet should not pass (such as 10.x.x.x). Devise a method or protocol that will continue to conceal the addresses of the hosts on the internal network but still allow SSH connections from the Internet to arrive at the proper destinations. What supporting infrastructure must the Drib add to its network?

c. The inner firewall will pass SSH connections, provided that one endpoint is the trusted administration server on the internal network. With the above-mentioned change, the destination of the incoming SSH connection may be any host on the internal network. For this question, assume that the addresses of the hosts on the internal network are kept within the internal network-in other words, that the method or protocol in part (b) is implemented. What are the security implications of allowing SSH connections to any internal host through the inner firewall? Should such connections be restricted (for example, by requiring users to register the hosts from which they will be connecting)?

d. An alternative to allowing the SSH connections through the firewall is to provide a specific host (the "SSH host") on the internal network that is also connected to the Internet. Telecommuters could use SSH to log into this system, and from it reach systems on the internal network. (The difference between this method and allowing connections through the firewall is that the user must log into the intermediate host, and from there move to the internal system. The firewall approach makes the intermediate system transparent.) Identify the minimum number of services that this system should run in order to fulfill its function. Why must these services be run? As part of your answer, identify any other systems (such as DNS servers, mail servers, and so on) that this SSH host would have to trust.

e. From the point of view of Saltzer and Schroeder's design principles [865] (see Chapter 13), is the solution suggested in part (d) better than, worse than, or the same as the solutions involving access through the firewall? Justify your answer.

Reference no: EM131310070

Previous Q& A

  Explain importance of critical path in project management

Explain the importance of the critical path in project management. Examine the advantages of using a Gantt chart over a PERT chart and vice versa. Determine when it is appropriate to use one over the other.

  Display sentinel value so that user may ultimately be able

Loop through all of the above steps until the user types the sentinel value when prompted. Display the sentinel value so that the user may ultimately be able to demonstrate an understanding of the way in which to end the program.

  What would be the firms expected dividend per share

Coca-Cola stock has an expected ROE of 14% per year, expected earnings per share of $4, and expected dividends of $2.50 per share. Its market capitalization rate is 15% per year. a) what are its expected growth rate, its price and its P/E ratio? b) I..

  What is the list price of the bond on the settlement date

Calculate the price of the bond for a market interest rate of 3% per half year. Compare the capital gains for the interest rate decline to the losses incurred when the rate increases to 5%. A bond with a settlement date of April 30, 2013 and a maturi..

  Complete the code that passes the array a and b

Complete the code that passes the array a and b from process 0 to process 1 using the algorithm shown in textbook p.246. Vary the size of arraya and b from 100, 1000, and 2000 to compare and discuss the results.

  What is the required rate of return on the project

Stock XYZ has an expected return of 12% and B = 1. Stock ABC is expected to return 13% with a beta of 1.5%. The market's expected return is 11% and r1 = 5%. According to the CAPM,which stock is a better buy? What is the alpha of each stock? What is t..

  Create a system reference guide for your employer

You have been called upon to put together some reference materials for other groups to follow, Create a System Reference Guide for your employer in three parts over Weeks Two, Three, and Four.

  How enciphering of connections would affect thumbprinting

If the connection contents were enciphered using a link encipherment protocol, would thumbprinting work? Why or why not?

  Create an uml sequence diagram explaining the addition

The firms involved in the financing, parts suppliers, manufacturing hardware suppliers, design consultants, and the labor unions want to see a uml sequence diagram explaining the addition.

  What would the bonds be selling for if yields had risen

Fix-It Inc. recently issued 10-year, $1000 par value bonds at an 11% coupon rate. Assume bond coupons are paid semiannually. Two years later, similar bonds are yielding investors 6%. At what price are Fix-Its bonds selling? What would the bonds be se..

Reviews

Write a Review

 

Similar Q& A

  Calculate a checksum that is the modulo 8 sum

How do you calculate a checksum that is the modulo 8 sum of all the bytes in the following packet C4 04 03?

  How many times greater can the constant factor

How many times greater can the constant factor be for Shell sort to be faster than Insertion Sort when n = 1000? How many times greater can the constant factor be for Quicksort to be faster than Insertion Sort when n = 1000?

  Destroy or damage computers for political reasons

Someone who uses the Internet or network to destroy or damage computers for political reasons

  Information management for the accounting industry

Ascertain the importance of information management for the Accounting industry Analyze the fundamental impact of IT architecture or enterprise architecture on information management for the Accounting industry.

  Write a python programs to solve the following

Write a Python programs to solve the following 1. An electronics company sells circuit boards that cost $21.99. Assume tax is 9%. Print the total price of 3 circuit boards.

  Computer system that has no operating system

What inconveniences can be faced by a user who is interacting with a computer system that has no operating system?

  Write a program to compute a customer bill

Write a program to compute a customer's bill. The program should request the quantity of each item ordered in a void function, calculate the total cost with a value returning function.

  Maintain a data structure that associates the file stream

Obtaining the correct process ID from this structure will allow pclose() to select the child upon which to wait. This structure will also assist with the SUSv3 requirement that any still-open file streams created by earlier calls to popen() must b..

  Eliminate unit productions from the following

Eliminate unit productions from the following CFG S->AB A->a B->C/b C->D D->E E->a

  Legal issues in information security and incident response

The news media often publicizes cyber crime activities. Discuss one of the cyber crimes you have heard about, explaining the crime along with how it was discovered and investigated? What was the outcome? If the investigation is ongoing, based on t..

  Department of management information systems

Identify the benefits of using e-learning from the perspective of students of the first level in the Department of Management information systems.

  Create a bcg matrix for jetblue airways

Create a BCG Matrix for JetBlue Airways. Recommend speci?c strategies and long-term objectives. Show how much your recommendations will cost. Clearly itemize these costs for each projected year. Compare your recommendations to actual strategies pl..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd