Access control list, Computer Network Security

Assignment Help:
Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and write data.) The hosts can also run email (SMTP) servers available to other hosts on the network, but these are not available to the outside. Instead, all outside mail is routed to a machine named “S”, which forwards it to the internal host, and all internal mail addressed to external hosts is routed to “S”, which forwards it to the destination. There are no other servers available to the outside on “S”.

Model access control matrix using three hosts, “S”, “I” for a host on the network, and “O” for an outside host. Don’t forget to include the HTTP servers!

Write a command that allows “I” to exchange email directly with “O”, bypassing “smtphost” entirely.

Now consider a second host called “R” on the network. This host has just been added to the network and has no rights initially. Write a command that gives it the ability to send email to “O” if, and only if, “I” can send mail directly to “O”.

Related Discussions:- Access control list

Use the chinese remainder theorem to evaluate x, Use the Chinese remainder ...

Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

Management of classified data-risk management, Management of Classified Dat...

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

Pgp encryption, Produce a short report of your experiences in installing an...

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

Find the capacity of the wcdma, Question: (a) Describe the term interfe...

Question: (a) Describe the term interference in the space, time, frequency, and code domain. (b) Consider a 1 G - AMPS: 824-849 MHz (forward) ; 869-894 MHz (reverse). B

Perimeter network security system, Title: Perimeter Network Security System...

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Venn Diagram Problem, Students were asked about search engine they used.90 ...

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

Project, project on ensuring data securities on cloud computing

project on ensuring data securities on cloud computing

Describe how access control is implemented, Question: (a) How can you ...

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

Digital signatures, Digital Signatures Digital Signatures are encrypted ...

Digital Signatures Digital Signatures are encrypted messages which can be proven mathematically to be authentic. These are created in response to rising requirement to verify in

Assignment, Hello i have submitted an assignment and i am still waiting to ...

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd