Networking and Protocols Report Each answer requires at least one academic source and should be written following APA style. A general style guide can be found within the classroom and if you have any...

1 answer below »
Hello, the document NetworkingandProtocolsReport.doc has the requirements. Its a 2 part report, where each part needs to be 1000 words minimum




Networking and Protocols Report Each answer requires at least one academic source and should be written following APA style. A general style guide can be found within the classroom and if you have any questions, please feel free to contact me if this resource is unable to help you. The minimum word count for Part 1 is 1000 words. The minimum word count for Part 2 is 1000 words. Part 1 Answer the following questions: 1. Identify two attacks that use wireless or mobile networks. Describe the attack and how it is implemented. What can be done to mitigate this type of attack? 2. Research and describe two vulnerabilities presented by concepts discussed in the Multimedia Networking chapter. This may include, but is not limited to, streaming services, VoIP, or QoS. 3. Describe the process of the Diffie-Hellman key exchange process. Draw out an example of how this exchange happens. This will consist of a graphical representation of the Diffie-Hellman process and a textual step by step description. 4. You have been able to use Wireshark to see how your host and the web server is able to communicate securely. Research two attacks, one on the client side and one on the server / service side, can put the user or server at risk. Ensure that you identify which attack is associated with the client and which is associated with the server. What is that attack? How does the attack work? How can the client or server mitigate those attacks? 5. Identify and describe three mechanisms that are used to create as secure connection with a web server Part 2 Answer the following questions: 1. Describe three vulnerabilities associated with TCP or UDP. What can be done to mitigate or prevent these vulnerabilities from being exploited? 2. Describe the benefits of using TCP over UDP. Why is there a need to use UDP? 3. Compare and contrast two ways in which a TCP connection ends (graceful vs abrupt shutdown). 4. Identify an attack that uses ICMP. Describe the attack and how it is implemented. What can be done to mitigate this type of attack? 5. Describe three reasons why a ping command would not work when trying to reach a destination. 6. Identify one attack that uses ARP or attacks the network’s Link Layer. Describe these attacks and provide a real-world example for each of these attacks. A realworld example means that it has occurred. 7. Research how you could change the MAC address on a system. Describe the following: o The process for changing the MAC address. o How would an attacker use this for nefarious purposes? o Describe a situation where this has occurred. This is another example of an attack that has occurred in the lab or in the wild
Answered 2 days AfterMay 09, 2021

Answer To: Networking and Protocols Report Each answer requires at least one academic source and should be...

Himanshu answered on May 12 2021
155 Votes
1

Part – 1
Ans. 1 – Mobile Networks and Wireless we have two common method to using the internet
in daily life. Wireless networks provides fast and reliable network connectivity. There are
some attacks that an attacker try in mobile and the wireless connection, here we are
discussing two common attacks that are below –
 SMiShing – It is common use attack, in this user get a sms of a fraud message or
links. When a user an open that link it will reflect to the website where attacker tr
y to
get information of the user. It also happen after clicking link a malware can be
download in your device and steal your data. You can protect yourself by these kind
of attacks, you should never click on links which you don’t about it and should report
on the link. If you see it is send by an orgazition you can complaint about of the sms.
 Rouge Wireless Device – Rouge wireless device and access point is the unauthorized
wireless device that added in the network these are not managed by the network
admins it can be gateway of attacker. If an attacker have direct access to AP or
network a malicious attack can be done by attacker. The solution of this attack is you
need to implement authentication process and network control list, after that you have
full control of securing your network.
Ans. 2 – Vulnerability you can refer as a weakness of any system or infrastructure where any
attacker can attack on the devices. Now will discuss two examples of multimedia
vulnerabilities.
2

 VOIP – In Voice over ip you have multiple types of vulnerabilities the data
verification cannot done this can be cause of the man in the middle attack. You have
low resources in the embedded so that is an attacker point. The next point is resources
should be secure on every side it can be os or platform also. Physical connectivity or
collision of packet need to be manage.
 Streaming Services – In today’s world most of user are using the service of
streaming, YouTube is great example you can see so it very important to secure the
user data. First of all the user authentication and authorization must be highly
protected and in other hand both client and server should uses the encryption method.
URL video and the video files that also be encrypted these methods can secure our
video streaming methods.
Ans. 3 - Diffie-Hellman key exchange process – This algorithm shared a secret key that can
be used for the secure communication on the public network, it used the elliptic curve to
generate points and will get a secret key using parameters.
3

Above picture show how the key is generated in this you can see how keys are exchanging
and a Calculation done to generate that.
Ans. 4 – Client Side Attack –
 Client side attack where username, password, cookies, session management and other
information can be steal. Attacker can create fake links and website and try them to
attack with client.
 Content Spoofing – In this attacker create a fake website or send a mail to user to steal
the information. Their attacker create a same original website and mail user so the
user can trust and enter his personal information like bank accounts and credit card
information, after stealing attacker sell their data and shut his own website.
 Cross site scripting – In this a malicious code is run in the user browser which can be
written in any language like java, these codes are already attached on some website
one user open the website these code are executed automatically, you need to always
check the website should be open as https which is secure.
Server Side Attack –
 These kinds of attack on the web server for viewing or downloading file with
authorization.
 Path Traversal Attack – Web server are only allowed the web document root
directory, in this attacker access the files outside the allowed directory.
 DOD Attack – Denial of service attack here attacker launch multiple websites and
message boards, this attack is complex to resolve. High speed packets arrived here
that can be a cause of find the issue.
 SQL Injection - Attacker try to attack in form of the SQL query.
4

Ans. 5 – We have multiple mechanism that makes our web connection secure, lets discuss
one by one below –
 HTTPS – Hypertext transfer protocol secure, it uses the encryption so it is secure, and
SSL are used for sending data. In that SSL all information are stored it is a certificate
that tells the complete details of the website. It used the port no. 443, sender send first
data and checked the receiver is same where data to be send. It is safest protocol that
not attacked by the attacker.
 SSL – Secure Socket Layer that provides security between browser and server. This
method encrypt the link between the user and server so make the data is private and
not accessible by the attacker. SSL has four protocol’s (record protocol, alert protocol,
handshake protocol and change cipher spec protocol). ...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here