Describe how the encapsulated security header protocol, Computer Network Security

Assignment Help:

Question:

(a) Give 2 benefits of using IPsec.

(b) IPSec uses two protocol for security: Authentication Header protocol (AH) and the Encapsulated Security Header Protocol (ESP). Why is AH required with ESP even though ESP provides authentication?

(c) Describe how the Encapsulated Security Header protocol (ESP) can be used to provide traffic analysis confidentiality using IPSec.

(d) What is a Security Association (SA) and what does it define? Why are there two SAs per one connection? How can two communicating peers agree on what kind of SAs they use?

(e) List two types of firewall that can be used.

(f) Describe the following threats to firewalls:
(i) Denial of service,
(ii) IP Spoofing and

What countermeasures can be adopted against these threats.

(g) What is a honey pot and why is it commonly used?


Related Discussions:- Describe how the encapsulated security header protocol

How does message switching operate, Question: Human telephone conversat...

Question: Human telephone conversations are characterized by irregular pauses, alternating with irregular bursts of speech. In contrast, communication via computers is char

Hypothetical reliable data transfer protocol, Hypothetical reliable data tr...

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

Describe how access control is implemented, Question: (a) How can you ...

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Plaintext, how to encryt the data in plaintext cipher

how to encryt the data in plaintext cipher

The Security Systems Development Life Cycle (SecSDLCtle.., #Under what circ...

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Point to point transmission(ppp), Normal 0 false false fals...

Normal 0 false false false EN-US X-NONE X-NONE

ISDN, Explain the architecture of ISDN.....?

Explain the architecture of ISDN.....?

Udp datagram format, UDP DATAGRAM FORMAT: It is given in the figure be...

UDP DATAGRAM FORMAT: It is given in the figure below:

Address resolution with table lookup, ADDRESS RESOLUTION WITH TABLE LOOKUP ...

ADDRESS RESOLUTION WITH TABLE LOOKUP : Resolution needs data structure that has information about address binding. A distinct address-binding table is used for every physical n

Design a network layout, QUESTION: (a) Below is a capture of an Ethern...

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd