Wednesday, August 28, 2019

Week 6 _Assignment Essay Example | Topics and Well Written Essays - 750 words

Week 6 _Assignment - Essay Example It provides authentication as well as integrity of data and information of the user (Interpeak, 2005). IP Spoofing- An intruder connects to host server by duplicating his/her IP address when address-based authentication is been used. The IPSec protocol uses cryptographic authentication rather than address-based authentication for protecting from IP spoofing attack (Oppliger, 1998). Session Hacking- An intruder can connect to a server which is authenticated. At that point of time, IPSec helps to protect the connection as the intruder does not know the session key necessary for encrypting the data stream (Oppliger, 1998). Denial-of-Service- An intruder sends TCP messages to flood buffer space of targeted system but if there is IPSec protocol it will provide a denial-of-service attack and will reveal intruder’s identity if he/she is using original IP address (Oppliger, 1998). Application layer manages views of the user over the network. It defines about the processing of the application on different systems end communicate over the network. All the processes which are running in various systems or else end-users communicate with the help of application layer protocol (Rouda, 2006). XML stands for Extensible Markup Language, which is used to encode document in a format which is understandable by both human beings and machine. It facilitates to develop a common format of information in a flexible manner. Yes, it is possible to design a universal security solution at one layer. Generally, security suites work on one layer without collaborating with other protocols. A security system can be build with single layer of the Open Systems Interconnection (OSI) model. The OSI model is really a theoretical device used to help explain how the network and internet functions. When a Web communications is secured using Secure Sockets Layer (SSL) which is used for securing message transmission

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.