UP TO 15 % DISCOUNT

Get Your Assignment Completed At Lower Prices

Plagiarism Free Solutions
100% Original Work
24*7 Online Assistance
Native PhD Experts
Hire a Writer Now
ICT318: Network Security Assignment, SUSS, Singapore: Implementing security protection using packet filtering router firewalls is a fairly common for all network systems
University Singapore University of Social Science (SUSS)
Subject ICT318: Network Security Assignment
Posted on: 9th Jun 2023

ICT318: Network Security Assignment, SUSS, Singapore: Implementing security protection using packet filtering router firewalls is a fairly common for all network systems

Question 1

(a) Assess and comment on the following statements,

(i) “Implementing security protection using packet filtering router firewalls is a fairly common for all network systems but they are not as effective and efficient”.

(ii) “Only either AH (Authentication Header) or ESP (Encapsulating Security Payload) protocol can be implemented in an individual Security Association (SA) but not both. However a particular traffic flow can be provided by both AH and ESP”.

(b) Assess and analyse the email header of an email, using Yahoo mail, Hotmail or otherwise, based on Activity 5 of Study Unit 3, Chapter2.

(i) Provide the steps of how the email header may be read from the chosen email service.

(ii) List and explain TWO (2) MIME headers of your email.

(iii) Authenticated Received Chain (ARC) helps preserve email authentication results and verifies the identity of email intermediaries that forward a message on to its final destination. Identify and explain the three ARC headers.

Hire a Professional Essay & Assignment Writer for completing your Academic Assessments

Question 2

(a) (i) Apply columnar transposition algorithm to the following ciphertext and determine its plaintext:

CGIPPURRSYAFTHNOY

Assume that the key is “ASSESS”, ignoring all spaces.

(ii) Apply Vigenère Square cipher algorithm to the plaintext obtained in Q2(a)(I), using the key, ‘CRYPTO, describe how the resultant ciphertext can be obtained. {Note: Use the Vigenère Square table given below}

(iii) What is the possible weakness of using Vigenère Square method of encryption?

(b) (i) Apply symmetric encryption technique, determine THREE (3) concerns relating to algorithm and keys.

(ii) Apply the use of symmetric and asymmetric cryptosystems, discuss how authentication, integrity and non-repudiation can be provided. You may make use of an appropriate diagram to illustrate your answers.

Question 3

(a) Refer to the following website:  access the SSL test pcap file. Explore the SSL_test pcap file and determine the following:

(i) What is the chosen Cipher Suite and explain how did the server obtain the
Cipher Suite?

(ii) Discuss the main purpose of the Premaster Secret, and identify how it was encrypted.

(iii) Discuss clearly the relationship between Change Cipher Spec and Encrypted Handshake Message.

(b) (i) Go into any browser and open up any web-based (X.509 Version 3) public
certificate. Illustrate by using your chosen certificate and determine the following items:
– the purpose of the certificate and the issuer.
– the public key, the signature algorithm and the issuer’s signature.
– the URL where the CRL list can be found and highlight one of the CRLs (Provide a screen-shot of all these items as part of your illustration)

(ii) Discuss how verification can be done to determine if the public certificate is genuine and came from the correct source. Illustrate your answer by using an appropriate diagram.

Stuck with a lot of homework assignments and feeling stressed ? Take professional academic assistance & Get 100% Plagiarism free papers

Question 4

(a) An intrusion detection system (IDS) can be seen as a device or software application that monitors a network or systems for malicious activity or policy violations.

(i) Examine the difference between threshold detection and profile-based detection used in statistical anomaly detection.

(ii) A small-medium enterprise has set up a computer network system solely for its employees. The employees have working there for a good number of years and are expected to continue working there till their retirement and beyond.

However, the network administrator who is recently employed is relatively new and not so experienced.

– Examine what is the enterprise’s chances of setting up an effective intrusion detection system and why?

– Determine and recommend which detection system would be suitable for the enterprise? Explain your answer.

(b) A cybersecurity consultancy firm has a headquarter (HQ) in Singapore and a branch in Bangkok. The network systems between the Bangkok the HQ linked via Internet.

As the firm is relatively new, you have been asked by your CISO to determine establishing a secured communication between the two networks i.e. HQ Network and Bangkok Network. Confidentiality of the traffic must be provided, including the IP addresses of the sending and receiving devices. All the Internet traffic will flow via the gateways.

You are told that the Server at HQ and the Server at Bangkok hold sensitive data information. The keys to encrypt the data information between these two servers must reside in these machines only. Essentially the firm do not find authentication as an issue.

Apply IPSEC and recommend suitable IPSEC configurations for the company to provide the necessary secured communication. Discuss why you have made these recommendations.

(c) Discuss what are the security services specified by the IEEE 802.11i RSN standard. Illustrate, in your answer, the appropriate security protocols supporting these services

Buy Custom Answer of This Assessment & Raise Your Grades

Get Help By Expert

Are you facing challenges with your ICT318 Network Security assignment at SUSS? Look no further than our Report Writing Service, your trusted partner in academic success. Our skilled professionals are well-versed in the subject and can guide you in implementing security protection using packet filtering router firewalls. Don't let group-based assignments overwhelm you - seek our assignment writing service and ace your course!

Categories:-
Tags:-
Answer
No Need To Pay Extra
  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00
    Per Page
  • Consultation with Expert

    $35.00
    Per Hour
  • Live Session 1-on-1

    $40.00
    Per 30 min.
  • Quality Check

    $25.00
  • Total
    Free

New Special Offer

Get 30% Off

UP TO 15 % DISCOUNT

Get Your Assignment Completed At Lower Prices

Plagiarism Free Solutions
100% Original Work
24*7 Online Assistance
Native PhD Experts
Hire a Writer Now
My Assignment Help SG Services
My Assignment Help SG

Rated 4.9/5 Based on 22945 Singaporean Students