Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble. Answer should be a clear explanation and should be clear understanding...

1 answer below »


Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.



Answer should be a clear explanation and should be clear understanding (1000 words).



Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books.



When use citation from any reference please keep it between "citation" (Author,Year),please citation should be not more than 5%



As reference you can use the following book:


Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition)


Author: Anderson, R.


ISBN: ISBN-10: 0470068523 ISBN-13: 978-0470068526


Publisher: John Wiley & Sons



Book available from below link:



http://www.cl.cam.ac.uk/~rja14/book.html




Assignment is:


(HW) We have discussed security protocols from IP layer (e.g., IPSec) to application layer (e.g. XML and S/MIME). Network and transport layer security often referred to as a point-point or host-to-host security. Security channels between applications can be defined as an end-to-end security. Discuss differences between point-to-point and end-to-end security models and security problems they address. Are they redundant? Can you properly secure your site using only one of them? What is the drawback of using end-to-end security? Provide examples and arguments to support your viewpoint.


You will find an abundance of materials on this subject within the databases located within IEEE & ACM digital libraries. But don't forget that especially in the Networking technologies RFC's and other related standards are the most authoritative source of information.


Document Preview:

Laureate Online Education Information Security Engineering © All rights reserved 2000-2009. The Information Security Engineering module, in all its parts: syllabus, guidelines, lectures, discussion questions, technical notes, images, projects and any additional material is copyrighted by Laureate Online Education. Information Security Engineering Seminar for Week 6 Network and Internetworking security, digital content protection Internet security is a fashionable and fast moving field with attacks on the Internet often making the headlines of widely distributed newspapers such as The New York Times. Unfortunately, these reports are often misleading. This week we will be studying security issues related to the Internet - concentrating on protection mechanisms. In particular, we will cover the following topics: the most common attacks, distributed denial of service attacks, intrusion detection, firewalls, IETF security protocols, and XML security. For several sections of this lecture, we will assume that you are familiar with network protocols, e.g. you have taken the CC module, or have some prior knowledge of computer communication. Please also re-read Seminar 1 materials related to the OSI/Internet Security Architecture, security services and mechanisms. The most common attacks Most reported attacks on the Internet fall into the following three categories: software implementation faults such as buffer overflow, protocols failure, and password guess. The textbook lists the Internet’s Top 10 vulnerabilities. Up to now the most important attacks on the Internet have been the Internet Morris worm, SYN flooding, and Distributed Denial of Service attacks (for definitions see Section 18.2.2 in the textbook). In the following, we will briefly describe Distributed Denial of Service Attacks since it is easy to find published information on SYN flooding and the Morris worm in textbooks. For more information...



Answered Same DayDec 22, 2021

Answer To: Answer should be original, and similarity (plagiarism) not more than 10% this is very important...

David answered on Dec 22 2021
131 Votes
Understanding Security
When working with any system, ensuring the security of all the nodes in that system and the data
transmission between these nodes becomes very important. Security management includes
Identification an
d Authentication of the user in the system, and correct Authorization to the user for
accessing accurate data and performing allowed operations. Such procedures can be achieved with
implementation of Privacy and Integrity concepts. Systems which enable flexible, customizable and open
interfaces to its users, are subjected to unauthorized access which can harm an enterprise.
Confidentiality of the system can be ensured by using a comprehensive model of security. In a good
security model, both point-to-point and end-to-end security measures should be well taken care of.
A good example of such a security embracing model is security protocols followed in Web Services. The
same has been researched below.
Point-to-Point Security
Point-to-Point Security Context 1
Point-to-Point security is achieved when the transport layer is secured by HTTPS transport using the SSL
(Secure Sockets Layer) protocol. When under a SSL protocol enabled session, the client and server
authenticate each other by negotiating on a common encryption algorithm and the cryptographic keys,
prior to the transmission of data. Message integrity and confidentiality of both the nodes and data
exchanged is taken care of by SSL.
Why is Point-to-Point Security important?
Imagine yourself placing an online order with a website by using your credit card as the mode of
payment. The application or the browser in use requires total protection of such sensitive data. There
can be serious consequences if a hacker gets to read your cookie, or is able to redirect some fake
webpage in between with an intention to gather credit card or billing address details. In such a case,
high security is needed at the transport layer, which is typically taken care of by TLS or SSL protocols
especially when HTTPS is involved.
A hacker may add a fake network node all-together in between the communication channel tricking the
web client to believe that it has exchanged information with the web server. Thus, only encryption and
decryption is not the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here