What is the actual running environment of tool

Assignment Help Computer Network Security
Reference no: EM13519818

Part -1:

1. What is the difference between a block cipher and a stream cipher?
2. List ways in which secret keys can be distributed to two communicating parties.

Part -2:

Consider a Feistel cipher composed of 16 rounds with block length 128 bits and key length 128 bits. Suppose that, for a given k, the key scheduling algorithm determines values for the first 8 round keys, k1 , k2 , . . . k8 , and then sets

Suppose you have a ciphertextc . Explain how, with access to an encryption oracle, you can decrypt c and determine m using just a single oracle query. This shows that such a cipher is vulnerable to a chosen plaintext attack. (An encryption oracle can be thought of as a device that, when given a plaintext, returns the corresponding ciphertext. The internal details of the device are not known to you and you cannot break open the device. You can only gain information from the oracle by making queries to it and observing its responses.)

Part 3:

Suppose an error occurs in a block of ciphertext on transmission using CBC. What effect is produced on the recovered plaintext blocks?

What is a one-way function?

Briefly explain Diffie-Hellman key exchange.

In an RSA system, the public key of a given user is e = 31,n= 3599. What is the private key of this user?

Part -4:

List four functions supported by S/MIME.

What is the purpose of HTTPS?

What are two ways of providing authentication in IPsec?


In SSL and TLS, why is there a separate Change Cipher Spec Protocol rather than including a change_cipher_spec message in the Handshake Protocol?

Part -5:

What are the principal elements of a Kerberos system?

What is the role of a CA in X.509?

Part -6:

List and briefly define IEEE 802.11 services.

What security areas are addressed by IEEE 802.11i?

In IEEE 802.11, open system authentication simply consists of two communications. An authentication is requested by the client, which contains the station ID (typically the MAC address). This is followed by an authentication response from the AP/router containing a success or failure message. An example of when a failure may occur is if the client's MAC address is explicitly excluded in the AP/router configuration.

a. What are the benefits of this authentication scheme?

b. What are the security vulnerabilities of this authentication scheme?

What effect does "setgid" have on directories? On files?

What is a rootkit? Why are they hard to detect?

Part -7:

Why are file system permissions so important in the Linux DAC model?

How do they relate or map to the concept of "subject-action-object" transactions?

Part -8:

1 What are the two kinds of ACLs in Windows, and what does each do?

2 Why does XBox Live use only IPSec and not IPv4?

Paige's (simplified) token looks like this:

User:
FOOCorp\PaigeH
Groups:
Everyone
Authenticated Users
Developers
Her word processor attempts to open a file for RWX access, and the
file has the following ACL:
Administrators: Full Control
Authenticated Users: RW
Developers: RWD
Will Paige be granted access to the object? Why or why not?

3. Practical Assignment:

(Note: You need to use a tool that is different from the one you used for assignment 2.)

General Description:

This practical assignment is intended for you to get familiar with some of the current security tools. These tools are powerful and are widely used in the security community. You may find some of the tools useful in protecting your own computer as well as computing resources within your organization. Special attention should be paid in choosing some of the tools and instructions should be followed.
1) Select a tool from "Top 100 Network Security Tools" (https://sectools.org/). The use of an open-source tool is highly encouraged.
I choose Cain and Abel

Cain and Abel

UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. For downloads and more information, visit the Cain and Abel homepage.

2) It is required that you install and run the tool in an enclosed network environment or use it on your own computer ONLY. An enclosed network environment means a non-operational networked system without any physical connection to other working computing environments (e.g., the Internet). Special attention should be paid when you use network scanners, sniffers, hacking tools or password crackers because their usage may violate an organization's security policies or compromise other computing resources. It is therefore your own responsibility to guarantee that the running of security tool(s) does not violate your organization's regulations, procedures, policies, and/or local, state and federal laws.

3) Follow the instructions to configure and run the tool you chose.

4) Write a brief report (2-3 pages, single-spaced, not counting quotations used). In your report, answer the following questions in your own words (please do not copy/paste from a tutorial or other online materials).

a) What is the functionality of the tool?
b) What is the actual running environment (software and hardware) of the tool?
c) How will you evaluate the tool based on your own experience?
d) In what aspects could the tool be improved?

5) Take a screenshot (usually by pressing Shift + PrintScreen) during the running of the tool and paste it in your lab report. In your lab report you can provide as many screenshots as you want and/or other output to show you have actually run the tool.

Reference no: EM13519818

Questions Cloud

Define the skeletal structure of the major organic product : Draw the skeletal structure of the major organic product produced when 2-methylpropanoyl chloride reacts with 3-methylbutanoic acid in the presence of the weak base, pyridine.
Calculate how large is the current in the heart : The body contains many small currents caused by the motion of ions in the organs and cells. Measurements of the magnetic field around the chest due to currents in the heart give values of about 1.0 µG. how large is the current in the heart
Explain the negative terminal of a voltmeter : Prepare an electrochemical cell by connecting the negative terminal of a voltmeter to a strip of zinc in a solution of 0.500 M ZnCl2(aq) and the positive terminal to a strip of copper in a solution of 0.100 M CuCl2(aq). The two half-cells are conn..
Entertain alternatives are usually good habits to cultivate : Experiments are designed to answer factual questions, not ethical questions. Italian scientists have successfully grown an embryo from a chimpanzee’s egg and human sperm. So, while this experiment answers a factual question, it also raises ethical..
What is the actual running environment of tool : What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?
Calculate the average kinetic energy of a helium atom : 7.4 mol of helium are in a 16 L cylinder. The pressure gauge on the cylinder reads 68 psi. calculate the average kinetic energy of a helium atom
Find the frequency heard by the listener : A sound source emits sounds of frequency 215 Hz that travel through still air at 340 m/s. Find the frequency heard by the listener
Explain the pka of the acid function at the 2-position : The pKa of the acid function at the 2-position is approximately 2, whereas that at the 1 position is about 3. Which of the 2 is more acidic and why
Calculate the volume flow rate in liters per minute : Blood flows in an aorta of radius 8.0 mm at 31 cm/s. Calculate the volume flow rate in liters per minute

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define intellectual property in cyberspace

Develop a one-page poster in Word or PowerPoint for a public service campaign to educate people about intellectual property rights of cyberspace for some aspect in your readings from this week.

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Using biometric device at office and home easily and cheaply

ESSAYS a special requirement mentioned back in milestone 1, Jack millss wished the system to have "state-of-the-art-maybe some biometric device which can be used in office and at home easily and cheaply.

  Turtle shell architecture

Turtle Shell Architecture, zero-byte representation, Access Control List, DNS Cache Poisoning attack, 16-pass iterative and 9-pass recursive PHP function

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  Analysis of a small publishing company

A small magazine publisher wishes to determine the best combination of 2-possible magazines to print for the month of July. Backyard magazine, which he has published for years, is a contant seller.

  Explaining organization-s security architecture

Consider your organization's security architecture. How much do you know about it? How much do other workers know? How easy is it to learn more?

  Limited management abilities

Originally Linux/UNIX systems had one all-powerful user called root that managed systems and discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Network management in network management why is it

network management in network management why is it important to carefully consider decisions that will lock the firm

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  System enforcing bibas strict integrity policy

Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd