Question 1broadly sort and discuss the types of safekeeping

Assignment Help Computer Networking
Reference no: EM13349383

QUESTION 1

Broadly sort and discuss the types of safekeeping that exists in communications?

QUESTION 2

a) Briefly confer the 3G Safekeeping model.

b) What are the main disparities between the 3G and GSM safekeeping models.

c) Interception within a 3G network can be quite problematic, as we know it. Regardless of that it is important to know how interception happens in such a network. Discuss about the concept and how this is attained.

d) In relation to interception on a 3G network what can be done to secure such hole in the organization.

QUESTION 3

Mobile wireless networks have transformed enterprises and generally how we communicate, freeing end-users from ties to a desktop computing setup and allowing them to be far more productive. A truly mobile network would have a significant advantage with the flexibility to shift strategies and being more competitive.
However, what's been missing from the idea of a mobile enterprise is a method to substantively evaluate the end-to-end safekeeping of such networks. There has been no truly reasonable way to accurately review every safekeeping aspect of a network and provide IT professionals with solutions that identify and correct safekeeping shortfalls.
You are hired as a safety Expert to provide a framework, which would be based around the foundation for safekeeping architecture standards ITU-T X.805 and ISO/IEC 18028-2, which tenders a result to this problem. The framework as we know should deliver a comprehensive methodology for assessing and upgrading end-to-end network safekeeping across the network. You will be playing a big role in helping bring secure connectivity to enterprises and government agencies with an understanding that to be truly effective, end-to-end safekeeping considerations must be evaluated and properly implemented at every stage of a network's lifecycle.
Admittedly, performing a inclusive safekeeping evaluation is a complex undertaking. Your sanctuary Framework should make it possible to evaluate one of the most vulnerable aspects of any infrastructure - in this case mobile - which is the air link. Furthermore, IT professionals should be able to determine if data travelling across that link is passably defended and, if not, what steps to take to assist in rectifying the situation.

The Reference Architecture

1482_safekeeping model.png

The orientation architecture for this assessment is based on a typical Wi-Fi network used by enterprises and hot spot service providers and includes a set of access points (AP), network admission controller (NAC) and authentication server (AS) as shown in stature 1.

The AP supplies wireless access to laptops, PDAs (personal digital assistants), and other mobile stations. It also supplies these devices with in sequence about the WLAN and responds to demand from them.

The main purpose of the Network Access Controller (NAC), commonly referred to as a "WLAN Gateway," is to perform or assist with user confirmation and to control network access. The NAC will not permit access to the network behind it unless the mobile station has been successfully authenticated and sanctioned.The NAC may put together other functions, including NAT (network address translation), DHCP (dynamic host configuration protocol) server, authentication server, and VPN server, etc.
The confirmation server is critical to implementing advanced safekeeping criterions such as 802.1x, WPA, and 802.11i/Robust Secure Network (RSN). It is responsible for user verification and authorization and can optionally participate in the key management. The remaining factors shown in the position architecture are common to wireless and wired networks.

Scope of the examination
The scope of the safekeeping analysis will include the end- to-end Wi-Fi network architecture and the entire framework from the ITU-T X805 should be functional, vulnerabilities should be identified for every layer, plane and dimension. For the sake of simplicity, the scope of analysis in your reacts should be limited to wireless admittance only. All applications running on top of Wi-Fi access with other enabler services such as DNS, DHCP, AAA etc., should be ruled out from the scope of your analysis.
a) Every type of Wi-Fi attack poses one or more threats, depending on intent and approach. Map down five popular Wi-Fi attacks to the threat model based on the ITU-T X805 Safekeeping Framework.
b) Scrutinize the impact on WIFI Layers.
c) Scrutinize the impact on the WIFI Planes.
d) Briefly illustrate the 8 safekeeping dimensions
e) Consider the effectiveness or the sufficiency of the controls available in each of the eight dimensions for all applicable modules in an attempt to determine the relative potency and weak spots of 802.11i, WPA2, WPA and WEP safekeeping standards.

Reference no: EM13349383

Questions Cloud

Question 1a company needs to consider its marketing mix in : question 1a company needs to consider its marketing mix in order to meet its customers needs effectively. explain the
Question 1a describe the term digital evidenceb when : question 1a describe the term digital evidence.b when thinking about the many sources of digital evidence it is often
Question 1case studythe virgin group the virgin group is : question 1case studythe virgin group the virgin group is one of the worlds most recognised brands. conceived in 1970 by
Part aquestion 1a explain why it is important for companies : part aquestion 1a explain why it is important for companies to practice integrated marketing communications.b discuss
Question 1broadly sort and discuss the types of safekeeping : question 1broadly sort and discuss the types of safekeeping that exists in communications?question 2a briefly confer
Question 1a critically examine the scope of marketing : question 1a critically examine the scope of marketing analysis that a company needs to undertake in the development of
Question 1the government of mauritius has recently launched : question 1the government of mauritius has recently launched a new concept to give a new impetus to the tourism
Question 1in todays highly competitive business world it is : question 1in todays highly competitive business world it is needless to mention that the need for a retention plan of
Question 1a what is the disparity between encryption and : question 1a what is the disparity between encryption and hashing?b why is it not always probable to use a white

Reviews

Write a Review

Computer Networking Questions & Answers

  Multiplexing signals directly onto sonet sts-1 channel

Suppose you could multiplex these signals directly onto SONET STS-1 channel how many MP3 songs could be trasmitted simultaneously?

  Give advice about use of cryptography to the developer

You have been hired to give advice about use of cryptography to the developer of new two products within a company. Group A is developing a product which will encrypt each user's data before storing it on the hard disk,

  Discuss the advantages and disadvantages of each approach

A backbone network can be constructed as a switched backbone, a routed backbone or a VLAN backbone. Each of these approaches has its advantages and disadvantages.

  Plan and design a lan/wan for citycampus

Outline tand discuss 3 major network security considerations that have to be addressed so that the school can be reasonablysure of truble-free continued operation.

  Computing ip addresses per subnet

How many IP addresses would they have per subnet?

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  What is the formula to calculate c/i

How is the interference problem identified in problem 1 usually solved? Explain how you know if the solution is adequate to fix the problem caused by the interference.

  Describe domain name system

Describe Domain Name System. Describe Hierarchical Namespace. Define Fully Qualified Domain Name and Partially Qualified Domain Name. What is transmission impairment?

  Explaining telecommunications asset life cycle model

Explain in scholarly detail role of telecommunications operations functions in Telecommunications Asset Life Cycle Model concept?

  Find the mean of the numbers in the array

Input a list of positive numbers (terminated by 0) into an array, find the mean (average) of the numbers in the array, and output the result. Use a subprogram to input the numbers, a function to find the mean, and a subprogram to output the resul..

  Mac destination address in ethernet header-arp payload

Describe the difference between MAC Destination Address in Ethernet header and one found in ARP payload.

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd