Cryptographic Techniques, Security Vulnerabilities, and Protection Strategies In Computer Networks and Web Applications

A review of cryptographic techniques and security strategies for protecting web applications and computer networks.

Dylan Price
Contributor
4.3
43
10 months ago
Preview (4 of 10 Pages)
100%
Log in to unlock

Page 1

Cryptographic Techniques, Security Vulnerabilities, and Protection Strategies In Computer Networks and Web Applications - Page 1 preview image

Loading page ...

Running Head:Outcome Assessment1Outcome AssessmentStudent8/11/2015Discuss variouscryptographic techniques,security vulnerabilities, andattack methodsrelated to computer networks and web applications. In your answer, address the followingpoints:1.Cryptographic Methods:oExplain the concept oftransposition ciphersand provide an example.oDefineBrute Force attacksand how they work in breaking encryption.oDiscuss the transition fromDEStoAESencryption and the advantages ofAES.oExplain theAttack Surfaceof an application and its significance inidentifying vulnerabilities.oDescribeDirectory Traversal Attacksand the potential risks they pose.2.Typesof Computer Viruses and Malware:oList and explainStealth,Multipartite,Polymorphic, andWormviruses,along with the methods used to protect against them.3.Encryption Algorithms:oDifferentiate betweensymmetric encryption(stream and block ciphers) andasymmetric encryptionalgorithms.oDiscuss the advantages and disadvantages of each encryption type.

Page 2

Cryptographic Techniques, Security Vulnerabilities, and Protection Strategies In Computer Networks and Web Applications - Page 2 preview image

Loading page ...

Page 3

Cryptographic Techniques, Security Vulnerabilities, and Protection Strategies In Computer Networks and Web Applications - Page 3 preview image

Loading page ...

Outcome Assessment24.Application Layer Attacks:oExplain the following types of attacks and methods to defend against them:ARP SpoofingBotnetsCache PoisoningComputer Worms5.Security Tools:oDescribe at leastthree security toolsthat can be used to identifyvulnerabilities in web applications, providing their functionalities.6.Public Key Infrastructure (PKI):oExplain the components and purpose ofPublic Key Infrastructure (PKI)insecuring electronic transactions.Provide specific examples and detail how each of these security measures and techniquesplays a role in protecting against various forms of cyberattacks.Word Count Requirement: 1000-1200 words.

Page 4

Cryptographic Techniques, Security Vulnerabilities, and Protection Strategies In Computer Networks and Web Applications - Page 4 preview image

Loading page ...

Outcome Assessment31 A.Transposition ciphertypeof cryptographicwaycreates cipher textwithreplacingindividualcharacter withone morefrom a “match-up list” a transposition cipher is awayofencryptionwithwhich the positionssupposedbyparts of plaintext are shiftedstatedto ausualsystem,consequentlythat thecipher textrepresents avariationof the plaintext.B.Brute Forcewayof code breaking tries possiblemixtures of characters inatryto“guess” the passwordand alsokey. Because Brute force attack isatryto guess a passwordwithsystematicallyattempting every possiblemixtureof letters,and alsonumbers,as well assymbols until youlearnthe oneaccuratemixturethat works.C.AES encryption algorithmchanged DES as thepresentstandard becausetheAdvanced EncryptionStandard,as asubstitute. The algorithm which waschoosesastheAESwas submittedwithits designersbelowthe nameRIJNDAEL.D.Thepartof an application that isobtainabletoclients (those who aregenuinealongwiththose who are not) isrecognizedas its attackoutside.Attack Surfacestudyisregardingmapping out whatelements of a systemrequireto be reviewedas well astested forprotectionvulnerabilities.And also thepoint of Attackoutsidestudyis to understand thethreatparts inan application, tocreatedevelopersas well asprotectionspecialistsconsciousof whatelements of the application arereleaseto attack,as well as alsotodiscoverways ofreducingthis,along withto notice whenas well ashow the Attackoutsidetransforms.E.When an attackerincreases access to restrictedlisting(likeas the rootlisting)through HTTP it isdescribeddirectory traversalbother.Directory traversal attacksareusuallyperformedapplyingWeb browsers.Someserver in which inputinformationfromWeb browsers is notconfirmedis vulnerable to thiskindof attack.(Kamal, 2014)2.Foursortings of virusesas well asthe methodsappliedto defeat them
Preview Mode

This document has 10 pages. Sign in to access the full document!