Access control list, Computer Network Security

Assignment Help:
Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and write data.) The hosts can also run email (SMTP) servers available to other hosts on the network, but these are not available to the outside. Instead, all outside mail is routed to a machine named “S”, which forwards it to the internal host, and all internal mail addressed to external hosts is routed to “S”, which forwards it to the destination. There are no other servers available to the outside on “S”.

Model access control matrix using three hosts, “S”, “I” for a host on the network, and “O” for an outside host. Don’t forget to include the HTTP servers!

Write a command that allows “I” to exchange email directly with “O”, bypassing “smtphost” entirely.

Now consider a second host called “R” on the network. This host has just been added to the network and has no rights initially. Write a command that gives it the ability to send email to “O” if, and only if, “I” can send mail directly to “O”.

Related Discussions:- Access control list

Media, what is guided media or unguided media

what is guided media or unguided media

Hypothetical reliable data transfer protocol, Hypothetical reliable data tr...

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

Describe header fields present in a udp segment, Question (a) In relati...

Question (a) In relation to a TCP segment structure, provide the fields responsible for: i. Connection Management ii. Flow Control iii. Error Control iv. Reliable, in-order

How will network datagrams be protected at network layer, (a) Consider the...

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

Syntax conversion, Write down the significance of the syntax conversion . S...

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Listing assets in order of importance-risk management, Listing Assets in Or...

Listing Assets in Order of Importance Weighting should be created for each category based on the answers to questions. The relative importance of each asset is calculated usin

Describe privacy-protecting techniques, Question: a) What do you meant...

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

Determine the functions of security components, You are designing a Demilit...

You are designing a Demilitarized zone for a large corporation. Using design best practice, and the information that you have learned so far, propose a design that will provide the

What is the use of digital certificate, Question: (a) What is the use ...

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Nessus vulnerability, You see two IP addresses. The IP address 192.168.58.1...

You see two IP addresses. The IP address 192.168.58.130 is the one of Bt4. The IP address 192.168.58.133 has ports 135 and 445 open; which indicates that it is a Windows machine. S

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd