StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Questions in Network Security - Coursework Example

Cite this document
Summary
Digital certificates are more like identification cards in that they are electronic credentials that serve the purpose of certifying online identities of organizations, computers and individuals as an entity on the network. In addition, the certificates also contain the public…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Questions in Network Security
Read Text Preview

Extract of sample "Questions in Network Security"

Role of digital certificate and digital certification ity Digital certificates are more like identification cards in that they are electronic credentials that serve the purpose of certifying online identities of organizations, computers and individuals as an entity on the network. In addition, the certificates also contain the public key of the owner and also feature the organization that issued the certificate. These certificates are certified and issued by certificate authorities (CAs). The main function of CAs is to issue digital certificates.

The other role of CA is to confirm the identity of the certificate’s holder or certificate’s subject and attest that the generated certificate’s public key is that of the certificate’s holder or certificate’s subject (Shoniregun 84).Advantages of combined a/symmetric cryptography over both cryptographies In symmetric key encryption (secret key encryption) method, data is scrambled by pressing same key to both decrypt and encrypt it while in asymmetric encryption (public key encryption), different keys are used to decrypt and encrypt.

In addition to this, asymmetric encryption allows sharing of key since decryption key is kept to oneself while with symmetric key encryption, the key have to be kept secret. In combined a/symmetric encryption, a random symmetric key is created to encrypt the data then the key is encrypted asymmetrically. The key is added to the encrypted message after being asymmetrically encrypted (Shoniregun 122). After the receiver gets the key, using their private key they decrypt it and decrypts the message using it.

Combined a/symmetric cryptography has several advantages over both cryptographies:Combining symmetric and asymmetric encryption can help reduce brute force attack which is a common weakness of symmetric keys whereby, to break the encryption all keys in the key space are tried.Asymmetric encryption helps in preventing creation of point attack while trying to improve feasibility of encrypted information through use of clearinghouse in symmetric encryption involving a large number of people.The combines of the two methods takes the advantage of the speed of symmetric encryption with the convenience of asymmetric encryption.

Combination of the two helps solve the associated slow problem of asymmetric algorithms since symmetric encryption is approximately a hundred to a thousand times faster than asymmetric encryption. When combined, key distributions and performance are facilitated without any security sacrifices.How SSL/TLS works SSL and TLS certificates are small sized data files used to digitally attach a cryptographic key onto organizational details. They both designed to serve the purpose of ensuring communications security over any computer network.

These protocols directly operates on TCP’s top (though, there they are also implemented to suite datagram based protocols like UDP). Through this, secure connection is still provided and still top layers protocols remain unchanged (like HTTP). Underneath the SSL layer, HTTP and HTTPS are identical. When using TLS/SSL appropriately, all what is visible to an attacker over the cable is which port and IP you are connected to, roughly what compression and encryption is used and the quantity of data you are sending.

He/she can also be able to end the connection, but this is realizable by both parties that a third party has tampered with the connections (Shoniregun 159).Web ServersCA Name/ ClassAsymmetric Algorithm/Key lengthSymmetric Algorithm/Key lengthHash AlgorithmYour Rating of Security(1-5)FidelityEntrust Certification Authority-L1E2048-bit _RSA-SHA23.5ScottradeVeriSign Class 3 Extended Validation SSL SGC CA2048-bit _RSA-SHA13.7PNCSymantec class 3 EV CA – G22048-bit _RSA-SHA13.6ChaseSymantec class 3 EV CA – G22048-bit _RSA-SHA13.

4GmailGoogle Internet Authority2048-bit _RSA-SHA14Yahoo! MailVeriSign Class 3 Public Primary Certification Authority – G52048-bit _RSA-SHA13.9 TwitterSymantec class 3 CA – G42048-bit _RSA-SHA2564.2Conclusion Security in internet connection and sending of information over the network is every individual’s, company’s or organization’s interests. Many are the times when personal or confidential information is read by unwanted or unauthorized persons through hacking.

Encryption is one of the major protector and counter of this vice when properly done and through the right procedures. A choice has to be made on which cryptography to go for depending on the sensitivity of the information and the level of security desired.Works CitedShoniregun, Charles A. Synchronizing Internet Protocol Security (sipsec). New York: Springer, 2007. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Questions in Network Security Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1685631-questions-in-network-security
(Questions in Network Security Coursework Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1685631-questions-in-network-security.
“Questions in Network Security Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1685631-questions-in-network-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Questions in Network Security

Connectivity and Security Issues - RADIUS Server

Full Paper Title Name University Purpose RADIUS server provides a mechanism that is based on distributed security.... hellip; The core objective is to separate communication channel from the security channel (RADIUS information, n.... In order to conduct a successful assessment, having a positive impact on the security posture of a system on the entire organization, elements of the examination must maintain the technical procedure.... The testing process enables organizations to develop a policy of information security assessment and methodology....
4 Pages (1000 words) Research Paper

Networks and Security

Networks & security Customer Inserts His/Her Name Customer Inserts Grade Course Customer Inserts 17th April, 2012 Question 1 Confidentiality is the act of non-disclosure of information to unauthorized persons or individuals.... This mechanism is effective in ensuring security of the data sent is highly secured.... Random nonces are effective in providing adequate security especially when sending repeated messages over the same network.... The main purpose of random nonce is to provide encryption and data security for messages or records....
3 Pages (750 words) Assignment

The Concept of a Browser Security

security Science Name Instructor course Date Question 1 In most cases, the Botnets are majorly in application for the Distributed Denial-of-Services attacks.... The Botnet application can be useful through numerous ways apart from the usual security purposes that it serves.... Question 4 A browser security is an application designed for web browsers to use in internet security for safeguarding of networked data.... Hackers with intentions to exploit the security for a browser often use JavaScript....
5 Pages (1250 words) Assignment

Assessment of Technology centric Strategies for information security in an organization

[National security Agency] Fahey (2004) graduated from the SANS GSEC course and uses their systematic approach to addressing risk through defense in depth.... The SANS approach promulgates an efficient and cost effective methodology for improving security.... The organization for which he works already had a number of policies, each designed to address a multi-layered approach to IT security such as operations security, physical security and contingency and disaster recovery....
3 Pages (750 words) Essay

Network Management

The paper "network Management" tells us about ProPrint PLC.... It is a company engaged in providing full-service color printing.... It operates nationally and currently employs staff with diverse needs.... hellip; The CEO.... Ian Kruger is aware that the company must invest and exploit IT to remain competitive and to expand its customer base....
9 Pages (2250 words) Assignment

Firewall Architectures and Techniques A study on the high speed network security they provide

There are variety of tools and techniques to break the security of the intranet network, so it becomes more and more difficult to protect the network of an enterprise that is the mission of network firewall. … The project is intended to describe and evaluate firewall architectures and techniques and network security they provide.... The firewall is the central issue of the network security policy of the enterprise that defines procedures to protect the network and its contents and users from loss and damage. Firewall Architectures and Techniques: A study on the high-speed network security they provide INTRODUCTION 1 Introduction to the problem being tackled, and the rationale behind choosing the problem With the fast development of Internet and enterprise networks, security becomes an important concern to companies all over the world....
2 Pages (500 words) Essay

Software Development, QA, Anti-Piracy

Information constitutes the core asset of any corporate entity and as information is being increasingly stored on digital media, it is imperative that companies institute security… Given the value of information and the extent to which its unauthorized access and subsequent misuse has the potential to wreak al havoc upon corporate entities, the strategies which companies employ for both the design and implementation of their corporate policies are of singular importance....
4 Pages (1000 words) Essay

Basic Concepts of Checksum or CRC Integrity Checks

… The paper “Basic Concepts of Checksum or CRC Integrity Checks, Checksum and CRC Checks Inadequacy for security” is an informative example of an assignment on logic and programming.... The paper “Basic Concepts of Checksum or CRC Integrity Checks, Checksum and CRC Checks Inadequacy for security” is an informative example of an assignment on logic and programming.... The likely causesThe new Wiki software has caused network intrusion leading to the breach of security....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us