Nt1310 Unit 9

Great Essays
UML 91.561 Computer & Network Security I

HomeWork 1

Name – Nrupen Abnave
Student ID -01382247

1.1
(a)
Describe the major structure of a TCP packet and explain the main functions of the TCP headers.
-

TCP is a transport layer protocol and is connection oriented.
Its reliable connection, has error checking and flow control.
TCP Headers: 32bits
Source and Destination Ports – Each 16bit number. Indicate which application is using the communicating stream. Used by most common services – FTP(21), SSH(22), SMTP(25), HTTP(80), DNS(53), POP(110).
Sequence and Acknowledgment- Keep segments in order and data is delivered. As large chunk of data is broken down into segments and transmitted, they may not be received in the same order
…show more content…
Substitution is the simplest method that replaces a character in the plain text with a fixed different character in the cipher text. This method preserves the letter frequency in the plain text and so one can search for the plain text from a given cipher text by comparing the frequency of each letter against the known common frequency in the underlying language.

1.7
Let h be a hash function and r a reduction function. Let T be a rainbow table of k rows for D under h and r, where the jth row is (wj1,h(wjn j ) for 1 ≤ j ≤ k. Let Q0 = h(w) and Q1 = (h ◦ r)i(Q0), where i ≥ 0. Suppose Q1 = h(wjn j ) for some 1 ≤ j ≤ k and i ≤ j.
(a)
- w will appear in the jth chain of h(wjni)=Q0, wjni =(roh)i (wj1)

1.7
(b)
- w wil not appear in the jth chain of
No i such that , Q= h(wjni ).

1.7
(c)
Collisions can be avoided , using different reduction functions to produce a password chain. That’s why this technique helps in increasing the likelihood that w appears in the jth chain of wj1 , … , wjnj

1.10
(a)ShieldsUP – Scanning for loopholes

1.10
(b)

Related Documents

  • Decent Essays

    In order to provide reliability and quality of service (QoS) rules or policies that prioritize packets for outbound port queue will be in implement to meet the bank management requirement. The Internet and WAN connection will use multi-protocol label…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6

    • 858 Words
    • 4 Pages

    Task-5 a) • Metals Metal structure is made up of crystals of metals which are made up of positive metal ions and these ions are surrounded by a sea of delocalized electrons. To separate these substances from this crystal lattice a lot of energy is needed. In between the positive and negative ions is present a strong electrostatic force of attraction. That is the reason why metals have strong melting and boiling points. In order to slide one layer of the metal ions over the other layer very less amount of energy is used.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 2

    • 592 Words
    • 3 Pages

    I am a registered health information technologist. I am currently working on an Epic implementation as an analyst and trainer. All answers are based on my personal experience or my previous education unless denoted by in text citation. TASK: A. EXAMINE ELEMENTS OF THE VENDOR SELECTION PROCESS BY DOING THE FOLLOWING: 1.…

    • 592 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 2

    • 234 Words
    • 1 Pages

    1. Who will participate in the evaluation? The person that will participate in this evaluation is my cousin. 2.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    4. rcv() fcn, which will store the passed string argument internally. The fcn will also output the string (message) prefaced by "Node rcvd: ", where is the node object's name. Eg, “ Node B rcvd: 10010”. 5.…

    • 888 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    1. Focus on the overall “security assessment” risk rating that appears at the top of your report. Considering what security measures you (or the computer owner) have undertaken for your computer, does the assessment surprise you? Why or why not? What measures should you plan to undertake if the green checkmark did not appear?…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 4 Thr

    • 474 Words
    • 2 Pages

    Complete Name: Unit 4 Student Name: Davidson, Amber Nicole ********************************************************************************************************** 1. Name at least four things checked for in a DUR. Student Answer: When a physician is writing an electronic prescription, they must select the drug and enter the SIG information. The EHR system scans the patient's chart for any known alergies.…

    • 474 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3 Quiz

    • 1731 Words
    • 7 Pages

    Please note that, we only discuss couple of options for each command to get the familiarity, and get you going with your learning. At the end of each command, there is a link to the command reference, where we discuss the most relevant and practical usages of the commands. It not practical to discuss all the options available for each command we discuss. We recommend you to refer to the man page of the command on your Linux system. Listing Files…

    • 1731 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Queuing schemes provide predictable network service by providing dedicated bandwidth, controlled jitter and latency, and improved packet loss characteristics. The basic idea is to pre-allocate resources (processor and buffer space) for sensitive data. Each of the following schemes require customized configuration of output interface queues [8]. • First In First Out (FIFO): the simplest form, which also known as first-come, first-served (FCFS) queuing, involves buffering and forwarding of packets in the order of arrival.…

    • 493 Words
    • 2 Pages
    Improved Essays