Describe the mutual authentication procedure

Assignment Help Computer Network Security
Reference no: EM131224060

Question 1: Explain about Snort Rules, create rules and test the created rules.

Question 2: Kerberos Authentication Protocol

You are required to do personal research to complete the following questions regarding this topic:

To answer these questions, you should consult reference materials from other texts and the Internet. You are required to reference these sources - DO NOT DIRECTLY COPY material from them - i.e. use your own words.

A. Give your general description of the Kerberos authentication protocol.

B. Explain the term: Authenticator used in the Kerberos authentication protocol.

C. In the Kerberos authentication protocol, there are 3 basic roles: client, server and Key Distribution Centre (KDC). Give your description of each of them.

D. By explaining the term: Session Ticket, describe how a session key is created by KDC, and distributed to the client and the server

E. Describe the mutual authentication procedure between the client and the server after the client obtains the session ticket

Question 3: Wireless Protocols

To answer some of these questions, you should consult reference materials from other texts and the Internet. You are required to reference these sources - DO NOT DIRECTLY COPY material from them - i.e. use your own words.

You are required to do personal research to complete the following questions regarding this topic:

A. Describe 802.1x authentication and the steps that when a wireless client connects to a network using RADIUS server for authentication.

B. Explain the PEAP protocol - how does it differs from EAP and what EAP deficiency does it address?

C. What makes a brute-force attack both particularly difficult and potentially easy on a wireless network using AES/CCMP encryption and 802.1x authentication? Hint: What do you need to know in order to attempt the attack?

D. Assume an office wireless network was only configured with WPA2-AES encryption (i.e. no additional authentication standards). What problems would this cause?

E. Assume an office wireless network was only configured with 802.1x authentication (i.e. no additional encryption). What problems would this cause?

Question 4: Steganography Exercise

This exercise requires you to use Steganography to embed secret text into a graphic file and also to embed a secret watermark into a second graphic file. To accomplish these tasks you are to download a copy of OpenStego from the internet.You will also need to download the two graphic files cqu_logo.png andBundaberg.jpg from the Moodle site.

a) Data Hiding in a graphic file

b) Watermarking a second graphic file

Question 5

You are the Chief Information security Officer (CISO) of a small medium sized - accounting Services Company. In the last few weeks, senior staff have been complaining that some confidential information has been disclosed via email without any authorisation. You are approached by the Chief Information Officer (CIO) to discuss the issue and see the most appropriate way to tackle this problem. You suspect that some of the employees might be using their technical skills to access sensitive information either from the mail serversor during transmission. To counteract this malpractice, you suggest the CIO the implementation of encryption. Before you actually implement the system, you want to conduct a pilot using the GNU Privacy Guard (GPG) software.

The pilot requires that you install GNU Privacy Guard (GPG) software onto your own computer and complete the following activities.

Note: The GNU Privacy Guard is available for free download from https://www.gnupg.org/ and "APractical Introduction to GNU Privacy Guard in Windows" by Brendan Kidwell is available at https://www.glump.net/howto/gpg_intro
After installing GPG software onto your own computer, complete the following tasks:

1. Generate your own key-pair by using GPG software and do not create a pass-phrase for your private key (in a real world this is not a good practice. Just for the sake of this assignment, do not create a pass-phrase). You need to use screen-shots to show that you have successfully completed this task. A valid screen-shot is similar to the one shown in Figure 1. Pay attention to the red circles, which demonstrate the success of key pair generation

Figure Key Pair Creation

2451_figure.png

2. Export your public key and paste it into your assignment document. You need to use two screen-shots to show that you have successfully completed this task. One screen-shot is to show the use of gpg command and the other is to show the exported public key. For example, the screen-shot in Figure 2, shows a public key, which is exported into the file: CC-pubkey.txt.

1800_figure1.jpg

3. Explain the steps how to import your Lecturer's public key from the key-server https://pgp.mit.edu (your lecturer created a public key and stored it at the MIT PGP Public Key Server). Include in the assignment document the gpg command line, individual options you used and their meaning. As above, use screenshots of website interactions, with accompanying explanations of the screenshots to explain the steps how to import your Lecturer's public key from the key-server https://pgp.mit.edu.

4. Create an ASCII text file to store your full-name, your student number, and your student CQU email address (please do not use any other email address). Then using your lecturer's public key, encrypt this text file. The resulting file should also be ASCII armored so that it is readable once decrypted by your lecturer / tutor. Failure to do so will result in loss of marks. Submit the resulting encrypted file along with your assignment solutions document (word document) via the online submission system and following the naming convention given above.

Reference no: EM131224060

Questions Cloud

How the business environment is influenced by government : Evaluate how their business environment is influenced by government economic policy which may be identified through your application of economic theory.
Primary advantages of the capital asset pricing model : Question 1: What are the primary advantages of the Capital Asset Pricing Model (CAPM) in pricing common stock? Question 2: What are some potential issues in effectively using the (CAPM) to determine the price of a stock?
Analyze four key points of a relevant economic article : Identify at least four key points of a relevant economic article from either the Strayer Library or a newspaper. The article must deal with any course concepts covered in Weeks 1-8.
Why do intrinsic values of companies : Why do intrinsic values of companies differ from actual stock values? What types of assumptions are made during the valuation process of a firm?
Describe the mutual authentication procedure : COIS23001 - Network Security - What makes a brute-force attack both particularly difficult and potentially easy on a wireless network using AES/CCMP encryption and 802.1x authentication? Hint: What do you need to know in order to attempt the attac..
How much total interest is earned on the original deposit : Interest-on-Interest Consider a $2,200 deposit earning 8 percent interest per year for 7 years. How much total interest is earned on the original deposit (excluding interest earned on interest)?
Evaluate role of federal reserve in stabiles current economy : Evaluate the role and the effectiveness of the Federal Reserve in stabilizing the current economy. Determine which economic indicators the Federal Reserve should analyze so it can better stabilize this particular economy.
What is the value of their cash and marketable securities : Oasis Products, Inc. has current liabilities = $10.0 million, current ratio = 1.50 times, inventory turnover ratio = 12.0 times, average collection period = 20 days, and sales = $100 million. What is the value of their cash and marketable securiti..
What is the value of the pakistan project : Read  The Case "Globalizing the Cost of Capital and Capital Budgeting at AES" - What is the value of the Pakistan project using the cost of capital derived from the new methodology?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain difference between metrics measures and measurements

Explain in your own words the differences between metrics, measures, and measurements. What types of measures will you need to collect during your proposed technology evaluation?

  Make an incident-response policy that covers the

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  Relationship between infrastructure and security

Justify and support the relationship between infrastructure and security as it relates to this data-collection and analysis company. Present the rationale for the logical and physical topographical layout of the planned network

  Fms attack and chopchop attack

[Wireless LAN Security-WEP] What is the main difference between the FMS attack and Chopchop attack? Clearly explain your answer

  Controversial topic in recent media stories

The escalation in computer crime is becoming an increasingly controversial topic in recent media stories. However, the way in which cybercrime is handled differs depending upon the country that has jurisdiction.

  What are the three components of the cia triangle

What are the three components of the CIA triangle? Describe what they are used for and provide examples of threats that could impact each component.

  Decrypt cipher-text by using secret key

Decrypt the cipher-text c = 12 by using secret key sk = (p, q) = (11, 13), where te corresponding public key is pk = (N, e) = (143, 13).

  Proposed changes to the tax code

A major part of U.S. Fiscal Policy is taxation. Taxation is the main source of revenue for the government. The tax code has been modified and grown more complex over the years. Proposed changes to the tax code continue to be debated as the country ..

  Identify hardware and software needed to secure your network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Compare Local Area Networks (LANs), Wide Area Networks (WANs), and wireless technologies.

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

  How disk encryption can help protect data in case h/w lost

Discuss your understanding of how disk encryption can help protect data in case the hardware is lost or stolen.

  What integration issues do merging companies face

What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd