Question

In: Computer Science

You have recently joined Star Technical Solutions as an information security officer. The company has been...

You have recently joined Star Technical Solutions as an information security officer. The company has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, you want to use another protocol which offers stronger security than SSL. Which protocol is similar to SSL but offers stronger security? Justify your answer by comparing the features of SSL and your proposed protocol in a tabular form.

Solutions

Expert Solution

Which protocol is similar to SSL but offers stronger security?

Answer:

Transport Layer Security (TLS) protocol is similar to Secure socket layer protocol (SSL) but offers stronger security. TLS protocol is the latest, secure and updated version of SSL protocol.

Justify your answer by comparing the features of SSL and your proposed protocol in a tabular form.

Secure socket layer protocol (SSL)

Transport Layer Security (TLS)

1) SSL 1.0 was designed by “Netscape” in the year “1994”.

1) TLS 1.0 was designed in the year “1999” as an upgrade of SSL Version 3.0

2) SSL uses symmetric cryptography. The most commonly used symmetric algorithms are AES-128, AES-192 and AES-256.

2) TLS follows a superior standardization process like RC4, Triple DES, AES, etc.

3) SSL has one alert message “NO Certificate”.

3) TLS has several alert messages.

4) After Message encryption is done, SSL uses “Message Authentication Code (MAC)”.

4) After Message encryption is done, TLS uses “HMAC” a hash-based message authentication code.

5) In SSL, the hash determination also includes the master secret and pad.

5) In TLS, hashes are determined over handshake message.


Related Solutions

You have recently joined Star Technical Solutions as an information security officer. The company has been...
You have recently joined Star Technical Solutions as an information security officer. The company has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, you want to use another protocol which offers stronger security than SSL. Which protocol is similar to SSL but offers stronger security? Justify your answer by comparing the features of SSL and your proposed protocol in a tabular form. b) One of...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked you to research two network firewalls. In this regard, you have to create a table by comparing features of firewalls in terms of filtering methods (stateless or stateful filtering), additional features these firewalls support (IDS, content filtering, etc.), and the cost of each firewall. Which one you would recommend to your supervisor? Justify your answer. please give answer in tabular form
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You...
You have been employed by Challenger Constructions as their first Chief Information Security Officer (CISO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for contingency planning include: A Recovery Time Objective (RTO) of 4 hours A...
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in...
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in the fast moving consumer goods industry. The shareholders of the company at their Annual General Meeting approved an ambitious major expansion project that will enable the company to gain market share. You as the CFO has been tasked with preparing a report for the company’s board of directors clearly evaluating the available financing options
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in...
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in the fast moving consumer goods industry. The shareholders of the company at their Annual General Meeting approved an ambitious major expansion project that will enable the company to gain market share. You as the CFO has been tasked with preparing a report for the company’s board of directors clearly evaluating the available financing options.
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in...
You have recently been appointed the Chief Financial Officer of Big Dreams Limited, a company in the fast moving consumer goods industry. The shareholders of the company at their Annual General Meeting approved an ambitious major expansion project that will enable the company to gain market share. You as the CFO has been tasked with preparing a report for the company’s board of directors clearly evaluating the available financing options.
You have joined a company as a security consultant, discuss the vulnerabilities of the company’s data...
You have joined a company as a security consultant, discuss the vulnerabilities of the company’s data and systems and propose a plan to protect company assets.
You have joined a company as a network security analyst. Your CTO came to know you...
You have joined a company as a network security analyst. Your CTO came to know you are a graduate from MIT Melbourne/Sydney and successfully completed a VPN unit. Therefore, you have been asked to develop a security plan for your customers and remote managers for their Internet access to the business. You need to analyse the following cases and recommend the solutions for the question quen-1) You want to assist customers in building trust with your company. Discuss with your...
issue in financial accounting You have been recently appointed as a lending officer in a large...
issue in financial accounting You have been recently appointed as a lending officer in a large bank. The bank is concerned about lending in the current economic environment, where there has been an economic downturn. Prepare a report outlining what agency problems the bank should be concerned with and how debt covenants in debt agreements can be used to reduce those problems. Also explain how accounting numbers can be used to assist in the process? Using the reference materials available...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT