Saturday, May 11, 2019
Week 6 _Assignment Essay Example | Topics and Well Written Essays - 750 words
Week 6 _Assignment - Essay ExampleIt provides certification as well as integrity of data and information of the user (Interpeak, 2005).IP Spoofing- An intruder connects to host server by duplicating his/her IP address when address-based enfranchisement is been employ. The IPSec protocol uses cryptographic authentication rather than address-based authentication for protecting from IP spoofing attack (Oppliger, 1998).Session Hacking- An intruder can connect to a server which is authenticated. At that point of time, IPSec helps to protect the connection as the intruder does not know the session key prerequisite for encrypting the data stream (Oppliger, 1998).Denial-of-Service- An intruder sends TCP messages to flood buffer space of targeted system but if on that point is IPSec protocol it will provide a denial-of-service attack and will reveal intruders individuation if he/she is using original IP address (Oppliger, 1998).Application floor manages views of the user over the int erlocking. It defines active the processing of the application on different systems end communicate over the network. All the processes which are zip in various systems or else end-users communicate with the help of application layer protocol (Rouda, 2006).XML stands for Extensible Markup Language, which is used to encode document in a format which is understandable by both human beings and machine. It facilitates to come up a common format of information in a flexible manner.Yes, it is possible to design a universal security solution at one layer. Generally, security suites work on one layer without collaborating with other protocols. A security system can be build with single layer of the outspoken Systems Interconnection (OSI) model. The OSI model is really a theoretical device used to help explain how the network and internet functions. When a Web communications is secured using Secure Sockets Layer (SSL) which is used for securing message contagious disease
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.