preview

C6520 Unit 2 Assignment 2

Decent Essays

ASSIGNMENT 2

CS6525 NETWORK SECURITY

1.
Generally, the horse of Trojans is coded programs coded for the purpose of harming the computer devices which appears to be harm free, but when the code is executed by users, the data & file systems are corrupted leading to damaging the computer devices.

Preventions

 The quality of monitoring system is very important, so that its used to scan & detect different kind of attacks preventing them from striking the system.
 Safety parameters should be taken while establishing any connection with the systems.
 We shouldn’t allow any work station to access which cannot be trusted.
 Software update in the workstations should be very regular, as the hackers can intrude the older version assuming it’s still running, newer versions of software cannot be updated that easily.
 Strong passwords prevent the access of unauthorized intruders to the workstation.

Flaws in Kerberos

Authentication …show more content…

Right after this process of Kerberos Alice will be receiving two kinds of messages from the system of Kerberos
 The first one is contained of the session-key for the encrypted Alice- B0b using the Alice- TGS session-key.
 Secondly, the next one will be contained of similar session-key as Alice & B0b’s but the difference is it’s obtained by using the B0b- TGS’s secret-key.
 Alice is able to extract from the session-key &decrypt the message sent first.
 Alice will also be sending the next message to B0b, and now bob is able to extract from the same kind of session-key &decrypt the message.
 Now they both will be having the same kind of session-keys.
 Therefore this key will used for further more mode of communication in between both of them.
5.

PKI is abbreviated as the Public-Key infrastructures, which is a system of cryptographic mechanisms, wherein we will have to use mainly two kinds of keys, they are:
 Public-key o This is being shared.
 Private-key o This is kept secretive. o Utilizes asymmetric form of

Get Access