Answer the following questions in essay format. 1. The packet has many partition
ID: 3866548 • Letter: A
Question
Answer the following questions in essay format.
1. The packet has many partitions. In your opinion, which are the most important?
2. What are the benefits of the proxy server?
3. What drawbacks are there?
4. If you were a CISO (chief information security officer) of a regional manufacturer that also designed and patented its own products, would you use symmetric or asymmetric encryption? Why? What attacks might this mitigate?
Your answers should:
Be 2 to 3 pages long (500 to 750 words)
Include at least four references (one from an academic journal, and others may be industry sources)
Follow APA citation format
Explanation / Answer
1. The packet has many partitions. In your opinion, which are the most important?
Packet has many partitions and the most important partition is
Each packet has 3 parts:
Header
Payload
Trailer
Header contains the Sender' and Receiver's IP address, Protocol used and Packet number
Payload contains the actual data.
Trailer contains the Data to show end of packet and the error correction.
Though all the three parts of the packets are very important but the header containing most of the crucial information like sender's and receiver's IP address, the protocol being used- which itself will disclose numerous information about the data and other information like length of packet, synchronization and packet number. Hence, In my opinion Header of the packet is the most important partition.
2. What are the benefits of the proxy server?
Proxy Server acts as an intermediate film between your computer and the internet. When you are using proxy server, your traffic is redirected to Internet using proxy server.
Benefits
1. It helps securing important information from getting exposed.
2. It can be used to bypass blocked websites.
3. It secures and maintains the privacy of the client’s computer while surfing with different proxies.
4. Proxy servers have excellent cache system and they may increase the speed for browsing the data. Hence, the performance Increase.
5. It also helps in load balancing, each server serves individual application area.
3. What drawbacks are there?
Drawbacks of proxy server:
1. The proxy server has the ability to log, capture, and track your activities, and if it is hosted by less-than-honest entities, the information you send over it could be used to cause damage.
2. It is more complex, as your services need to be directed through proxy.
3. Proxy servers can redirect or give you access to offensive websites, which were purposefully blocked.
4. If you were a CISO (chief information security officer) of a regional manufacturer that also designed and patented its own products, would you use symmetric or asymmetric encryption? Why? What attacks might this mitigate?
As a CISO, i would recommend Asymmetric encryption.
Asymmetric encryption uses two keys public and private key to encrypt and decrypt. Asymmetric encryption uses digital signatures which helps in maintaining the authenticity of data, Non- Repudiation - the person cannot deny on a later stage for non-applying the signature and also maintains the Integrity - it verifies the content before the signature and after the signature remains the same.
Confidentiality of the data is also maintained using asymmetric encryption - because the content is encrypted with an individual’s public key, it can only be decrypted with the individual’s private key, ensuring only the intended recipient can decrypt and view the contents.
A cyber attack is “asymmetric” if a relatively small number or low levels of resources are required by an attacker to cause a significantly greater number or higher level of target resources to malfunction or fail.
This would mitigate brute force attacks and also help in MITM attack maintaining the confidentiality and integrity of the data. This would mitigate brute force attacks and also help in MITM attack maintaining the confidentiality and integrity of the data. It also protects against Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.