(a)
Figure 1. Network Diagram
Source: (created by Author)
(b) The set of rules for the network model
Rule No. |
Transport |
Source IP |
Source Port |
Destination Port |
Destination IP |
Action |
1 |
TCP |
10.3.1.0 – 10.3.1.255 |
143 |
143 |
138.77.179.1 |
Allow |
2 |
TCP |
Any |
143 |
143 |
138.77.179.1 |
Deny |
3 |
TCP |
Any |
1433 |
1433 |
138.77.179.2 |
Allow |
4 |
TCP |
Any |
1023 |
Any |
138.77.178.1 |
Deny |
5 |
TCP |
138.77.179.1 |
1023 |
Any |
138.77.178.1 |
Allow |
6 |
TCP |
138.77.179.2 |
1023 |
Any |
138.77.178.1 |
Allow |
7 |
TCP |
31.13.75.0 |
1234 |
1234 |
10.3.3.31 |
Allow |
8 |
TCP |
23.63.9.0 |
1234 |
1234 |
10.3.3.31 |
Allow |
9 |
TCP |
10.3.3.31 |
1234 |
1234 |
Any |
Deny |
Table 1. The Networking Rules
Source: (created by Author)
Rule 1 & 2: It is created to block the external access to the network.
Rule 3: This rule would prohibit the researchers and the students from accessing the mail server.
Rule 4: This rule would block the other host addresses from accessing the web server.
Rule 5: This rule allows authorization for the request that are outside the network.
Rule 6: This rue defines the accessibility of the web server.
Rule 7 & 8 & 9: This rule is used to enable the SSH accessibility of the server.
The limitation of the application of the remote accessibility is that is causes a risk for the network and the intruder than use the channel for intruding in the network and thus cause a risk for the organization. The hacker can also access the database and modify it and thus different encryption technology is required to be applied for securing the network. The NAT (Network address translation) is required to be applied for mapping the IP address with a domain name for accessing the network from remote location.
(c) The networking rules that can be applied for the professor for accessing the network from home are:
NAT: The Network Address Translation would allow the user to access the network remotely. It performs the task of mapping and translating the Public IP addresses into the internal IP addresses. With the configuration of the network for the remote accessibility a large number of security risks can arise. Hence, this gives rise to the requirement of the intrusion detection system. This would help the network to restrict the access of the remote accesses to the network.
a. The MAC address filtering provides the user the option of defining a list of devices on the Wifi based network. This is not suitable for selecting it as security measure as the implementation of the system is very tedious and is also very easy to breach. This system basically gives false sense of security to the users.
b. The maximum key size that can be used for the WAP by AES is 256-bits. The maximum key size of typical passphrase is 25 characters.
The differences between the typical passphrases and the AES are:
Option 1
(a) Recommendations:
(b) Rules
Option 2
(c) The password manager is a software that helps the users to organize their password and store it in a place. The passwords can be stored in a single place very easily and can also be used for creating a master password, which a single but very powerful password that the user can create in order to set password to all of their systems.
(d) Advantages of Password management Application.
Disadvantages of Password management Application
(e) The differences between the LastPass and the KeePass are:
(f) In the standalone Password managers the database should store the password of the different users in the different drives and no users should have access to the passwords of the other users.
(a). Topology 5 and the its three nodes 1,2 and 3 are created.
The My Uni website is deployed
The certificate file of the website
The http.pcap file
(b)
(c)
(d) The certificate is generated on node 1 and the website is deployed on the node 3. The certificate that was generated from the node 1 was uploaded to the website on the node 3. In addition to this, in basic web browser the certificate is already in the web browser during a single session of the user.
(a) A malicious user can easily get to know the machine addresses of the server and the client and also get information about the location and the time of the users.
(b) If the NAT is used the mal practitioner would be unable to obtain the IP address of C and hence, would be unable to trace the existence of the user.
(c) The malicious user can also track the IP addresses and the location of the other machines that are communicating with VPN servers.
(d) The disadvantages of VPN servers:
Reduced performance between C and S: the VPNs would reduce the performance as the servers would take more time to identify the users as the IP addresses would be encrypted.
Required to trust the VPN server: The Clients would be required to trust the server and depend on the security of the severs.
VPN server logs may be requested/accessed: The Logs of the clients might be requested by the servers for identifications, but this might also by mal practitioners. Hence, the user would be unaware of their security.
(e) The Tor router shows the unindexed contents for the users. The contents of the tor router cannot be blocked by the ISDN firewalls. The communication between C and S would not be secure and they can communicate directly and the actual location and address of the user would be provided in the communication process.
(f) The main advantage of Tor is that the users can communicate in between the without any kind of restrictions.
(g) The main disadvantage of the Tor is that communications are nor secure neither restricted.
Bitansky, N., Canetti, R., Kalai, Y.T. and Paneth, O., 2014, August. On virtual grey box obfuscation for general circuits. In International Cryptology Conference (pp. 108-125). Springer Berlin Heidelberg.
Brakerski, Z. and Rothblum, G.N., 2014, February. Virtual black-box obfuscation for all circuits via generic graded encoding. In Theory of Cryptography Conference (pp. 1-25). Springer Berlin Heidelberg.
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Inácio, P.R., 2014. Security issues in cloud environments: a survey. International Journal of Information Security, 13(2), pp.113-170.
Goyal, V. and Arora, G., 2017. Implementation of Enhanced Interior Gateway Routing Protocol (EIGRP) in IPv6 Network. Research Journal of Advanced Engineering and Science, 2(1), pp.90-95.
Javid, S.R., 2014. Role of Packet Tracer in learning Computer Networks. International Journal of Advanced Research in Computer and Communication Engineering, 3(5), pp.6508-6511.
Lin, P.C., Hou, H.T., Wu, S.Y. and Chang, K.E., 2014. Exploring college students’ cognitive processing patterns during a collaborative problem-solving teaching activity integrating Facebook discussion and simulation tools. The Internet and Higher Education, 22, pp.51-56.
Prasad, N.H., Reddy, B.K., Amarnath, B. and Puthanial, M., 2016. Intervlan Routing and Various Configurations on Vlan in a Network using Cisco Packet Tracer. International Journal for Innovative Research in Science and Technology, 2(11), pp.749-758.
Sra, M. and Schmandt, C., 2016, March. Bringing real objects, spaces, actions, and interactions into social VR. In Collaborative Virtual Environments (3DCVE), 2016 IEEE Third VR International Workshop on (pp. 16-17). IEEE.
Wang, C. and Chen, J.Y., 2014, May. Implementation of GRE Over IPsec VPN Enterprise Network Based on Cisco Packet Tracer. In 2014 2nd International Conference on Soft Computing in Information Communication Technology (pp. 142-146). France: Atlantis Press.
Zielinski, D.J., Nankivil, D. and Kopper, R., 2017, March. Specimen Box: A tangible interaction technique for world-fixed virtual reality displays. In 3D User Interfaces (3DUI), 2017 IEEE Symposium on (pp. 50-58). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download