3. (Email Security) Download and install a freeware PGP, then generate a pair of
ID: 3710512 • Letter: 3
Question
3. (Email Security) Download and install a freeware PGP, then generate a pair of public and private keys, send the grader your public key generated by email. Then generate another email, sign it, and send the grader a copy of the signed email. Hint: go to gpg4win tool homepage (https://www.gpg4win.org/). What version of PGP are you legally allowed to download? given the country you are in.
4. (IP Security) If IPsec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP?
5. (Wireless Security) Find at least five known security vulnerabilities in 802.11, and propose possible solutions to each of them.
Explanation / Answer
Hi Dear,
As per the chegg guideline, Please post one question in a post.
I have answered Q5.
Please repost others in separate post.
5. (Wireless Security) Find at least five known security vulnerabilities in 802.11, and propose possible solutions to each of them.
1. Easily accessible to wireless LANs.
The solution for this is to conduct more audits and easy to catch unauthorized deployments, but this may lead to high cost of staff time may make walkthrough detection untenable in all but the most sensitive environments.
2. Wireless LANs have limited transmission capacity.
The solution for this is to address performance problems which starts with monitoring and discovering them.
Administrators may have many channels for performance and data ranging from purely technical measures such as SNMP to non-technical but potentially measures such as user performance reports.
3. 802.11 provides no protection against attacks which passively observe traffic.
The solution to this is while addressing the threat of eavesdropping, the key decision is to balance the
threat using only WEP against the complexity of deploying a more proven solution.
4. Once an attacker gains access to a wireless network, it can serve as a launch point
for attacks on other systems.
The solution for this is to the susceptibility of wireless LANs to attack, they should be treated as
untrusted networks.
5. 802.11 networks do not authenticate frames.
The solution for this is may be until the ratification of 802.11i, MAC spoofing will be a threat.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.