Question

In: Computer Science

(b) You have been employed as a network administrator in an organization. If you have to...

(b) You have been employed as a network administrator in an organization. If you have to send the data of your organization through the internet (there might be very untrusty network nodes), what kind of encryption will you use? Further, sometimes attackers exploit a special feature of the transport layer (segmentation and reassembly) to launch an attack. What attack is this? (c) Of the various firewall types available for use in a business network, which type collects network connection information and maintains dynamic state tables used for subsequent connections and which enables ports to be opened and closed as needed? Explain. Further, why is it so difficult to stop DDoS attacks by blocking the attacking IP addresses?

Solutions

Expert Solution

QUE: f you have to send the data of your organization through the internet (there might be very untrusty network nodes), what kind of encryption will you use

ANS: AES or Advanced Encryption Standard is a cipher, i.e., a method for encrypting and decrypting information. Whenever you transmit files over secure file transfer protocols like HTTPS, FTPS, SFTP, WebDAVS, OFTP, or AS2, there's a good chance your data will be encrypted by some flavor of AES ciphers - either AES 256, 192, or 128.

How does AES work? AES belongs to a family of ciphers known as block ciphers. A block cipher is an algorithm that encrypts data on a per-block basis. The size of each block is usually measured in bits. AES, for example, is 128 bits long. Meaning, AES will operate on 128 bits of plaintext to produce 128 bits of ciphertext.

Like almost all modern encryption algorithms, AES requires the use of keys during the encryption and decryption processes. AES supports three keys with different lengths: 128-bit, 192-bit, and 256-bit keys. The longer the key, the stronger the encryption. So, AES 128 encryption is the least strong, while AES 256 encryption is the strongest.

In terms of performance though, shorter keys result in faster encryption times compared to longer keys. So 128 bit AES encryption is faster than AES 256 bit encryption.

The keys used in AES encryption are the same keys used in AES decryption. When the same keys are used during both encryption and decryption, the algorithm is said to be symmetric. Read the article Symmetric vs Asymmetric Encryption if you want to know the difference between the two.

How is the AES encryption algorithm used in secure file transfers?

As mentioned earlier, AES is implemented in secure file transfer protocols like FTPS, HTTPS, SFTP, AS2, WebDAVS, and OFTP. But what exactly is its role?

Because symmetric and asymmetric encryption algorithms each have their own strengths, modern secure file transfer protocols normally use a combination of the two. Asymmetric key ciphers a.k.a. public key encryption algorithms are great for key distribution and hence are used to encrypt the session key used for symmetric encryption.

Symmetric key ciphers like AES, on the other hand, are more suitable for encrypting the actual data (and commands) because they require less resources and are also much faster than asymmetric ciphers. The article Symmetric vs Asymmetric Encryption has a more thorough discussion regarding these two groups of ciphers.

Here's a simplified diagram illustrating the encryption process during a typical secure file transfer secured by SSL/TLS (e.g. HTTPS, FTPS, WebDAVS) or SSH (e.g. SFTP). AES encryption operates in step 3.

OUE : what kind of encryption will you use? Further, sometimes attackers exploit a special feature of the transport layer (segmentation and reassembly) to launch an attack. What attack is this?

ANS:  

TCP SYN Flood Attack description

When a client and server establish a normal TCP “three-way handshake,” the exchange looks like this:

  1. Client requests connection by sending SYN (synchronize) message to the server.
  2. Server acknowledges by sending SYN-ACK (synchronize-acknowledge) message back to the client.
  3. Client responds with an ACK (acknowledge) message, and the connection is established.

In a SYN flood attack, the attacker sends repeated SYN packets to every port on the targeted server, often using a fake IP address. The server, unaware of the attack, receives multiple, apparently legitimate requests to establish communication. It responds to each attempt with a SYN-ACK packet from each open port.

The malicious client either does not send the expected ACK, or—if the IP address is spoofed—never receives the SYN-ACK in the first place. Either way, the server under attack will wait for acknowledgement of its SYN-ACK packet for some time.

QUE: which type collects network connection information and maintains dynamic state tables used for subsequent connections and which enables ports to be opened and closed as needed?

ANS:

A stateful firewall is a firewall that monitors the full state of active network connections. This means that stateful firewalls are constantly analyzing the complete context of traffic and data packets, seeking entry to a network rather than discrete traffic and data packets in isolation.

One of the most basic firewall types used in modern networks is the stateful inspection firewall. This type of firewall has long been a standard method used by firewalls to offer a more in-depth inspection method over the previous packet inspection firewall methods (think ACL's). This article takes a look at what a stateful firewall is and how it is used to secure a network while also offering better network usability and easier network firewall configuration.

QUE: why is it so difficult to stop DDoS attacks by blocking the attacking IP addresses?

ANS:

A distributed denial of service attack requires a flood of access requests from multiple servers, oftentimes controlled by a single hacker using a bot — a hostile program controlling other machines. One of the fundamental reasons DDoS attacks are so efficient, is that many DNS services can’t tell the difference between a legitimate server request and the bulk packets sent out by connected devices in an attack. In the past, experts have used router-filtering and over-provisioning bandwidth (making it more available than necessary for day-to-day traffic) to account for attacks. But digital security has fallen behind advancements in hacking. Firewalls, the most common form of server protection, were designed for the internet of the 90’s, not 2016. One of the only ways to mitigate damage, according to Cisco security, is to passively monitor traffic — to separate bad traffic from legitimate traffic in the case of an attack.


Related Solutions

You are a network administrator for your organization and arerequired to plan and deploy a...
You are a network administrator for your organization and are required to plan and deploy a new file and print server that will service Windows, Linux, and Macintosh client computers. In addition, the server will provide DHCP services on the network and host a small Web site listing company information. In a brief document, draft the services that you plan to implement for this server and the methods that you will use to maximize the security of the system.
You have been named the network administrator for a large insurance firm. Your responsibility is to...
You have been named the network administrator for a large insurance firm. Your responsibility is to come up with a plan for the network infrastructure, which includes number of servers, network security devices, desktops, laptops and handheld devices. The plan should be carefully crafted to show all the necessary details in deploying the infrastructure (LANs, firewalls, routers, switches, IDS and sensors, servers, database servers, and addressing scheme) including specifics about the configurations. An understanding of the security issues the company...
NETWORKING INTRODUCTION QUESTIONS. 1. You are the network administrator for an organization. You boot up a...
NETWORKING INTRODUCTION QUESTIONS. 1. You are the network administrator for an organization. You boot up a router, log into it, and issue a series of commands that changes the IP address of one of the interfaces. Which of the following statements is true? (Choose 2) a. The running config file and startup config file are no longer identical. b. The iOS image has been altered. c. The changes to the configuration are automatically saved to NVRAM. d. The startup config...
Assume you are the network administrator for a mid-sized organization. Recently, management has given permission for...
Assume you are the network administrator for a mid-sized organization. Recently, management has given permission for several employees to work remotely. Your organization has used VPN access in the past for short-term traveling assignments. Discuss the pros and cons of implementing DirectAccess, and always on VPN vs normal VPN solutions. Your post should be 250-500 words.
imagine you are an administrator at a large clinic or hospital. You have been asked by...
imagine you are an administrator at a large clinic or hospital. You have been asked by the CEO of the facility to provide a presentation to an MHA class on the nursing staff at the clinic or hospital. Discuss the various categories of nursing staffs, what they do, and the legal risks and ethical considerations for the health care provider in the different categories.
You have recently been employed by a company that wants to “go global” and you have...
You have recently been employed by a company that wants to “go global” and you have been selected to help research this possibility. The CEO has instructed you to research the country of France and report back. You must prepare a report on your country’s religion, government, and technology structures.
Network Organization Model Research a company that you believe uses a network organization model. Describe the...
Network Organization Model Research a company that you believe uses a network organization model. Describe the company, and explain why you think the company uses a network organization model, Answer in 7-10 sentences. For each website you visit to find information, if you use that information be sure to put it in your own words and include that website as a reference in APA format. Learning Organization Research a company that you believe is a learning organization. Describe the company,...
You are converting your network to an IP addressing scheme. You assign a junior administrator the...
You are converting your network to an IP addressing scheme. You assign a junior administrator the task of assigning addresses to your network hosts from the IP address range 202.17.68.0-202.17.68.255. He states that he used every one of the 256 addresses in the range. Which devices on the network will be unable to communicate with other network devices? Routers are protocol dependent at which OSI model layer? You are the network administrator for a large, global internetwork. You must update...
You have been hired as the financial administrator of Hummer Corp., an agricultural seed broker in...
You have been hired as the financial administrator of Hummer Corp., an agricultural seed broker in Northern Utah. Mr. Bullen, the president, has asked you to decide whether or not the company should purchase, at a cost of $450,000, a warehouse and the seed distribution rights for a major seed producer for farms extending from Idaho into Oregon. If the regional sales area is expanded, it is estimated that an investment of $100,000 in working capital will be required. The...
You have been employed as a cost accountant since a few years. You suspect that the...
You have been employed as a cost accountant since a few years. You suspect that the commercial manager is over-billing customers
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT