What is the actual running environment of tool

Assignment Help Computer Network Security
Reference no: EM13519818

Part -1:

1. What is the difference between a block cipher and a stream cipher?
2. List ways in which secret keys can be distributed to two communicating parties.

Part -2:

Consider a Feistel cipher composed of 16 rounds with block length 128 bits and key length 128 bits. Suppose that, for a given k, the key scheduling algorithm determines values for the first 8 round keys, k1 , k2 , . . . k8 , and then sets

Suppose you have a ciphertextc . Explain how, with access to an encryption oracle, you can decrypt c and determine m using just a single oracle query. This shows that such a cipher is vulnerable to a chosen plaintext attack. (An encryption oracle can be thought of as a device that, when given a plaintext, returns the corresponding ciphertext. The internal details of the device are not known to you and you cannot break open the device. You can only gain information from the oracle by making queries to it and observing its responses.)

Part 3:

Suppose an error occurs in a block of ciphertext on transmission using CBC. What effect is produced on the recovered plaintext blocks?

What is a one-way function?

Briefly explain Diffie-Hellman key exchange.

In an RSA system, the public key of a given user is e = 31,n= 3599. What is the private key of this user?

Part -4:

List four functions supported by S/MIME.

What is the purpose of HTTPS?

What are two ways of providing authentication in IPsec?


In SSL and TLS, why is there a separate Change Cipher Spec Protocol rather than including a change_cipher_spec message in the Handshake Protocol?

Part -5:

What are the principal elements of a Kerberos system?

What is the role of a CA in X.509?

Part -6:

List and briefly define IEEE 802.11 services.

What security areas are addressed by IEEE 802.11i?

In IEEE 802.11, open system authentication simply consists of two communications. An authentication is requested by the client, which contains the station ID (typically the MAC address). This is followed by an authentication response from the AP/router containing a success or failure message. An example of when a failure may occur is if the client's MAC address is explicitly excluded in the AP/router configuration.

a. What are the benefits of this authentication scheme?

b. What are the security vulnerabilities of this authentication scheme?

What effect does "setgid" have on directories? On files?

What is a rootkit? Why are they hard to detect?

Part -7:

Why are file system permissions so important in the Linux DAC model?

How do they relate or map to the concept of "subject-action-object" transactions?

Part -8:

1 What are the two kinds of ACLs in Windows, and what does each do?

2 Why does XBox Live use only IPSec and not IPv4?

Paige's (simplified) token looks like this:

User:
FOOCorp\PaigeH
Groups:
Everyone
Authenticated Users
Developers
Her word processor attempts to open a file for RWX access, and the
file has the following ACL:
Administrators: Full Control
Authenticated Users: RW
Developers: RWD
Will Paige be granted access to the object? Why or why not?

3. Practical Assignment:

(Note: You need to use a tool that is different from the one you used for assignment 2.)

General Description:

This practical assignment is intended for you to get familiar with some of the current security tools. These tools are powerful and are widely used in the security community. You may find some of the tools useful in protecting your own computer as well as computing resources within your organization. Special attention should be paid in choosing some of the tools and instructions should be followed.
1) Select a tool from "Top 100 Network Security Tools" (https://sectools.org/). The use of an open-source tool is highly encouraged.
I choose Cain and Abel

Cain and Abel

UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using dictionary, brute-force and cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented. For downloads and more information, visit the Cain and Abel homepage.

2) It is required that you install and run the tool in an enclosed network environment or use it on your own computer ONLY. An enclosed network environment means a non-operational networked system without any physical connection to other working computing environments (e.g., the Internet). Special attention should be paid when you use network scanners, sniffers, hacking tools or password crackers because their usage may violate an organization's security policies or compromise other computing resources. It is therefore your own responsibility to guarantee that the running of security tool(s) does not violate your organization's regulations, procedures, policies, and/or local, state and federal laws.

3) Follow the instructions to configure and run the tool you chose.

4) Write a brief report (2-3 pages, single-spaced, not counting quotations used). In your report, answer the following questions in your own words (please do not copy/paste from a tutorial or other online materials).

a) What is the functionality of the tool?
b) What is the actual running environment (software and hardware) of the tool?
c) How will you evaluate the tool based on your own experience?
d) In what aspects could the tool be improved?

5) Take a screenshot (usually by pressing Shift + PrintScreen) during the running of the tool and paste it in your lab report. In your lab report you can provide as many screenshots as you want and/or other output to show you have actually run the tool.

Reference no: EM13519818

Questions Cloud

Define the skeletal structure of the major organic product : Draw the skeletal structure of the major organic product produced when 2-methylpropanoyl chloride reacts with 3-methylbutanoic acid in the presence of the weak base, pyridine.
Calculate how large is the current in the heart : The body contains many small currents caused by the motion of ions in the organs and cells. Measurements of the magnetic field around the chest due to currents in the heart give values of about 1.0 µG. how large is the current in the heart
Explain the negative terminal of a voltmeter : Prepare an electrochemical cell by connecting the negative terminal of a voltmeter to a strip of zinc in a solution of 0.500 M ZnCl2(aq) and the positive terminal to a strip of copper in a solution of 0.100 M CuCl2(aq). The two half-cells are conn..
Entertain alternatives are usually good habits to cultivate : Experiments are designed to answer factual questions, not ethical questions. Italian scientists have successfully grown an embryo from a chimpanzee’s egg and human sperm. So, while this experiment answers a factual question, it also raises ethical..
What is the actual running environment of tool : What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?
Calculate the average kinetic energy of a helium atom : 7.4 mol of helium are in a 16 L cylinder. The pressure gauge on the cylinder reads 68 psi. calculate the average kinetic energy of a helium atom
Find the frequency heard by the listener : A sound source emits sounds of frequency 215 Hz that travel through still air at 340 m/s. Find the frequency heard by the listener
Explain the pka of the acid function at the 2-position : The pKa of the acid function at the 2-position is approximately 2, whereas that at the 1 position is about 3. Which of the 2 is more acidic and why
Calculate the volume flow rate in liters per minute : Blood flows in an aorta of radius 8.0 mm at 31 cm/s. Calculate the volume flow rate in liters per minute

Reviews

Write a Review

Computer Network Security Questions & Answers

  How much information is available to potential hackers

Maintaining a proactive approach on security requires that an organization perform its own hacking footprinting to see how much information is available to potential hackers

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

  Assume a propagation speed

Review the car-caravan analogy in Section 1.4. Again assume a propagation speed of 100km/hour

  Plan a high-level backup and disaster recovery plan

Plan a high-level backup and disaster recovery plan for a business. Discuss the security of the network and suggest best practices for securing the business network.

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  Identify the types of network components devices and

define the requirements and then design an appropriate network that would support this dental practice. your answer

  Why is a firewall a good place to implement a vpn

Security decision making should be based on rational thinking and sound judgement. In this context critique five security design principles with suitable examples.

  Comprise a brief description of how to comprise

write a 1400- to 2100-word paper that describes the security authentication process. discuss how this and other

  Campus ip addressing redesign understand the spread sheet

understand the spread sheet and redesign the present ipv4 network design and the attatchments gives the detailed

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  What is the decryption function

a). What is the decryption function, b). What is the decrypted plaintext? c). What are some weaknesses of this cipher?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd