Question

In: Computer Science

Answer the following questions and submit as a PDF on Webcourses. The assignment is worth 5%...

Answer the following questions and submit as a PDF on Webcourses. The assignment is worth 5% of your grade .

  1. For the TCP/IP model, describe 2 types of vulnerabilities commonly attacked for each layer. (40 points)
  1. Can two network interfaces have the same MAC address? Why or why not? Also, can two network interfaces have the same IP address? Why or why not? (10 points)
  1. Most modern TCP implementations use pseudo-random number generators (PRNG) to determine starting sequence numbers for TCP sessions. With such generators, it is difficult to compute the ith number generated, given only the (i - 1)st number generated. Explain what network security risks are created if an attacker is able to break such a PRNG so that he can in fact easily compute the ith number generated, given only the (i - 1) st number generated. (10 points)
  1. Explain how a stateless firewall would block all incoming and outgoing HTTP requests. (5 points)
  1. What is the main difference between WEP and WPA? (5 points)
  1. Give three different techniques that an attacker can use to make a victim send DNS requests to domains chosen by the attacker. (5 points)
  1. Which is worse for an intrusion detection system, false positives or false negatives? Why? (5 points)
  1. How does a honeypot fit in with the security provided by a firewall and intrusion detection system? (5 points)
  1. What is a distributed denial of service attack and how is it possible for a single person to orchestrate one? (5 points)

Solutions

Expert Solution

Can two network interfaces have the same MAC address? Why or why not? Also, can two network interfaces have the same IP address? Why or why not?

Answer:-------
Yes, two network interfaces can have the same MAC address. By manufacturing error or spoofing but it's not supposed to happen. Every network interface should have its own MAC address. If the MAC address is duplicated then the sender of information won't be able to recognize the network of the person who should be receiving the information.
No, two network interfaces can not have the same IP address it can confuse the computer that sent a message, it won't know if the message was received.

Explain how a stateless firewall would block all incoming and outgoing HTTP requests.
Answer:-------

User first sends request to SYN flag, which is a TCP packet flag used to initiate a TCP connection. If there is a response with a SYN-ACK packet then the connection is verified and the user gets granted access to the web site.

What is the main difference between WEP and WPA?
Answer:-------

WEP (Wired Equivalent Privacy) an encryption algorithm designed to provide wireless security, confidentiality, access control and data integrity, while WPA (WiFi Protected Access) Provides message integrity, and Temporal key integrity(TKIP). WEP Uses RC4 stream cipher. and Uses 40 bit key and 24 bit random numbers while WPA(WiFi Protected Access) use Temporal key integrity(TKIP), it's 256-bit key.
The main difference is also that WEP is an older form of encryption. Thus,WPA is a stronger form of encryption because it uses a longer key forencryption that is randomly generated.

Give three different techniques that an attacker can use to make a victim send DNS requests to domains chosen by the attacker.
Answer:-------

  1. Pharming: guides user to a fake website
  2. Phishing: steal data
  3. DNS cache poisoning

Which is worse for an intrusion detection system, false positives or false negatives? Why?
Answer:-------
False negative
because it means there is a problem that hasn't been detected yet and no one is doing anything to fix the problem. False positive is annoying but at least it forces everyone to double check security.

How does a honeypot fit in with the security provided by a firewall and intrusion detection system?
Answer:-------

Honey Pots can be setup inside, outside or in the DMZ, it is used as bait to gather information when an intruder tries to break into the system. Honey Pots learn as much as it can from the intruder by monitoring and saving evidence of their attack.

Q:- What is a distributed denial of service attack and how is it possible for a single person to orchestrate one?

Answer:-------
Malicious users leverage the power of many machines to direct traffic against a single web site in an attempt to create denial of service conditions. A single person can orchestrate this by using botnets, large networks of machines that have been compromised and are controllable remotely.


Related Solutions

Answer the following questions and upload to Canvas. Submit in Word or PDF format.  Show your work...
Answer the following questions and upload to Canvas. Submit in Word or PDF format.  Show your work and upload the Excel sheet as well. All the writing parts must be your original writing, don't quote, write in your own words. The following table presents the orders of Samson Company for the last 36 months (3 years). Month Order Year 1 Order Year 2 Order Year 3 January 502 614 712 February 408 592 698 March 491 584 686 April 456 532...
Instructions: Answer the following questions. Submit your answers to questions 1-5 as a Rich Text Format...
Instructions: Answer the following questions. Submit your answers to questions 1-5 as a Rich Text Format file (.rtf), Word document (.doc), or ASCII text file (.txt). For problem 6 submit an excel sheet containing your chart. 4. (40 points) Determine the number of statement executions (precise big-Oh) for each of the following sample code, as described in the lecture. Your answers should be in the form of a Big-Oh polynomial (e.g., O(3N2 + 7N + 6)). Sample #1: for (int...
Instructions: Answer the following questions. Submit your answers to questions 1-5 as a Rich Text Format...
Instructions: Answer the following questions. Submit your answers to questions 1-5 as a Rich Text Format file (.rtf), Word document (.doc), or ASCII text file (.txt). For problem 6 submit an excel sheet containing your chart. 1. (12 points) State the order of magnitude for each of the following mathematical functions. (Hint: Find the dominant term and drop its coefficient) 5n2 + 105 nlogn 5n3 – 7n + 30 (n2 / logn)+ 40000n + 1000 (5n2 + 8n + 3n)...
For this assignment, please submit the answers to the following questions, as well as an Excel...
For this assignment, please submit the answers to the following questions, as well as an Excel spreadsheet which documents the work you did. Do poets die young? According to William Butler Yeats, “She is the Gaelic muse, for she gives inspiration to those she persecutes. The Gaelic poets die young, for she is restless, and will not let them remain long on earth.” One study designed to investigate this issue examined the age at death for writers from different cultures...
For Assignment 2, submit a word or pdf file with the SQL queries along with screenshots...
For Assignment 2, submit a word or pdf file with the SQL queries along with screenshots of the outputs. (It is ok if the whole problem cannot be answered, if possible, I just would like an idea of how to begin, thanks in advance!) 9. Write a query to count the number of invoices. 10. Write a query to count the number of customers with a balance of more than $500. 11. Generate a listing of all purchases made by...
Course : Physical Security Submit a paper on the weaknesses of biometric authentication Assignment is worth...
Course : Physical Security Submit a paper on the weaknesses of biometric authentication Assignment is worth 50 points and 10% of your grade Submit a paper on the weaknesses of biometric authentication There are numerous examples of weaknesses, write about the ones which interest you the most Do NOT use bullets, that is not APA format! Paper MUST be submitted in APA format Propose a mitigating control or controls to help overcome the weaknesses identified in your paper Submit at...
________________________Directions: Answer the questions and submit to Week #6 assignment 1.) Pre-Operative Phase – List 3...
________________________Directions: Answer the questions and submit to Week #6 assignment 1.) Pre-Operative Phase – List 3 criteria a pre-operative surgical RN would assess in a patient who is having upcoming surgery. Explain what the Pre-Anesthesia Care Unit (PACU) is .2.) Intra-Operative Phase – Discuss role of “Circulating RN” during a surgical procedure. Discuss role of Scrub Tech/Scrub RN during a surgical procedure. 3.) Post-Operative Phase – Explain what occurs during PACU Phase I and Recovery Phase II after a surgery...
Answer the following questions and submit answers in Microsoft Word. Be sure to fully answer each...
Answer the following questions and submit answers in Microsoft Word. Be sure to fully answer each question. 1. Does a precedent system operate in your social group, at work or in making your personal decisions? Explain. 2. Burglar Bob breaks into Vince Victim’s house. Bob steals a flat screen television and laptop and does a significant amount of damage to the property before he leaves. Fortunately, Vince has a state-of-the-art security system. It captures excellent images of Bob, who is...
Create a separate file to answer the following questions and then submit it below. Draw the...
Create a separate file to answer the following questions and then submit it below. Draw the complete graph for each question. a. Draw a graph of the market for jalapeno peppers. Be sure to label everything. b. Draw a new graph that shows what changes would occur to your graph in part ‘a’ if there was bad weather and the jalapeno pepper crop was severely damaged. Explain why you made these changes to the graph. c. Redraw the graph you...
Answer all of the following Questions in depth. (Please write In PDF format) 1. Describe the...
Answer all of the following Questions in depth. (Please write In PDF format) 1. Describe the four types of Not-for-Profit entities. 2. Discuss the role of funds in accounting for NFP’s. 3. Discuss donor imposed restrictions on the use of contributions. 4. Describe the 3 types financial statements prepared by NFP’s. 5. Discuss the oversight bodies for NFP’s 6. Discuss the accounting for contributed services. 7. Describe the presentation of cash on the financial statements of NFP’s. Include in your...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT