Access control list, Computer Network Security

Assignment Help:
Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and write data.) The hosts can also run email (SMTP) servers available to other hosts on the network, but these are not available to the outside. Instead, all outside mail is routed to a machine named “S”, which forwards it to the internal host, and all internal mail addressed to external hosts is routed to “S”, which forwards it to the destination. There are no other servers available to the outside on “S”.

Model access control matrix using three hosts, “S”, “I” for a host on the network, and “O” for an outside host. Don’t forget to include the HTTP servers!

Write a command that allows “I” to exchange email directly with “O”, bypassing “smtphost” entirely.

Now consider a second host called “R” on the network. This host has just been added to the network and has no rights initially. Write a command that gives it the ability to send email to “O” if, and only if, “I” can send mail directly to “O”.

Related Discussions:- Access control list

Operation of the signature based intrusion detection system, Question : ...

Question : (a) State whether the following statement is FALSE or TRUE: It is always better to have various access points to the Internet so that if a hacker takes one down you

What are the main objectives of a risk analysis, QUESTION 1 Risk ana...

QUESTION 1 Risk analysis helps companies prioritize their risks and shows management the amount of money that should be applied to protecting against those risks in a sensib

Draw the waveform for an asynchronous transmission, (a) Draw the waveform ...

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Calculate the minimum required signal strength, Question 1: (a) (i) Ra...

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

Marketing, what are the participant of marketing channal?

what are the participant of marketing channal?

What do you understand by demilitarized zone, Problem 1: What does the ...

Problem 1: What does the SNMP access policy show? SNMP community diagram SNMP access policy Problem 2: Does there exist any formal functional specificat

Describe the two possible configurations for 3des, QUESTION (a) Describ...

QUESTION (a) Describe the two possible configurations for 3DES (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d

Cyber troll case, According to the case, The EZ Company introduced a new te...

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

Design a network layout, QUESTION: (a) Below is a capture of an Ethern...

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd