Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A person wishes to sniff the packets going to the outside world from your LAN. How is he going to check the information passing out

image text in transcribed

A person wishes to sniff the packets going to the outside world from your LAN. How is he going to check the information passing out of your network without letting the host or any one in the network know? What if it is a switched LAN or a broadcast LAN? Give a step by step description of both the scenarios A potential security threat with all the TCP based network services is that anyone can remotely conduct experiments to know whether a particular service is available. For instance, in an attempt to connect to a certain port on a specific machine (say M), any remote user can check if M is running an SMTP server on port 25. Under this scenario it becomes easy to find machines that are susceptible to send mail bugs. In order to combat such a potential threat, can you come up with a method through which only authorized users (who possess a certain secret) will be able to get response to a TCP SYN packet? Elaborate your method with the help of an example. A person wishes to sniff the packets going to the outside world from your LAN. How is he going to check the information passing out of your network without letting the host or any one in the network know? What if it is a switched LAN or a broadcast LAN? Give a step by step description of both the scenarios A potential security threat with all the TCP based network services is that anyone can remotely conduct experiments to know whether a particular service is available. For instance, in an attempt to connect to a certain port on a specific machine (say M), any remote user can check if M is running an SMTP server on port 25. Under this scenario it becomes easy to find machines that are susceptible to send mail bugs. In order to combat such a potential threat, can you come up with a method through which only authorized users (who possess a certain secret) will be able to get response to a TCP SYN packet? Elaborate your method with the help of an example

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Management Databases And Organizations

Authors: Richard T. Watson

3rd Edition

0471418455, 978-0471418450

More Books

Students also viewed these Databases questions

Question

=+11. Nonverbal Communication: Analyzing Nonverbal Signals [LO-5]

Answered: 1 week ago

Question

1.Which are projected Teaching aids in advance learning system?

Answered: 1 week ago