18 Jun WHAT ARE THE SECURITY CONCERNS OR ISSUES IN BUILDING THE MLS NETWORK?
Select one option from below and complete the discussion question.
Discuss/describe the port scanning and/or enumeration techniques (attacks) not covered in Module 2. How can the attacks you have described be detected and prevented?
Enhance and elaborate on the port scanning and/or enumeration techniques (attacks) covered in Module 2. Share any additional thoughts you may have on them and explain how they can be detected and/or prevented.
Conference 2 Local Area Network (LAN) Security (2 pages, 3 references)
Discuss/describe one or more LAN based attacks (also known as layer 2 attacks or lower layer attacks)
Discuss the security measures or methods used to prevent or mitigate the LAN based attacks you presented in Question 1.
Conference 3: TCP-IP Security (2 pages, 3 references)
Select one option from below and answer the discussion question.
There are many security vulnerabilities and flaws inherent in the TCP and IP protocols. Also, there are a variety of attacks based upon these vulnerabilities and flaws.
Option A) Conduct research on TCP/IP vulnerabilities and/or attacks. Choose one TCP/IP vulnerability or attack not covered in Module 4 that you consider important, and describe it in detail. Explain how the vulnerability or attack can be overcome or prevented. In addition, briefly explain why you chose the vulnerability or attack.
Option B) Enhance and elaborate on the TCP/IP vulnerabilities or attacks covered in Module 4. Share any additional thoughts you may have on them and explain how they can be overcome or prevented.
Conference 4: Covert Channels (2 pages, 3 references)
Complete Parts A & B:
Part A) Give one good example of a covert storage channel. Explain how the covert storage channel you described can be mitigated or prevented.
Part B) Give one good example of a covert timing channel. Explain how the covert timing channel you described can be mitigated or prevented
Conference 5: Wireless LAN (2 pages, 3 references)
Select one option from A & B below and complete the discussion question.
Option A) Discuss/describe the attacks associated with WEP, WPA, WPA2 or Bluetooth not covered in Module 9. How can these attacks be detected and prevented?
Option B) Enhance and elaborate on the wireless LAN and Bluetooth related security topics covered in Module 9. Share any additional thoughts you may have on them.
Conference 6: Network Security Architecture (2 pages, 3 references)
As a network architect, you plan to build a small network in a Multi-Level Security (MLS) environment. Your goal is to enforce the Bell-La Padula (BLP) access control model in the network. The BLP model was previously discussed in CSEC 630. In a nut shell, the model defines two mandatory access control rules:
No Read Up Rule: a subject (Low) at a lower security level must not read an object (High) at a higher security level. Simply, a Low entity cannot have read-access to a High object.
No Write Down Rule: a subject (High) at a higher security level must not write to any object (Low) at a lower security level. Simply, a High entity cannot have a write-access to a Low object.
What are the security concerns or issues in building the MLS network? How would you build the MLS network?
**** It may be helpful to the discussion to draw a diagram as an example and attach it to your posting. Please clearly state your assumption. To keep the discussion simple, assume only two security levels exist, High (Classified Security Level) and Low (Unclassified Security Level). This is an open question (there is no right and wrong answer). ****
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
