Saturday, June 27, 2020
Research and Describe TCP-IP Security and Cover Channels - 825 Words
Research and Describe TCP-IP Security and Cover Channels (Research Proposal Sample) Content: TCP-IP Security and Covert ChannelsNameInstitutional AffiliationTCP-IP SecurityThe Transmission Control Protocol/Internet Protocol make up the Internet Protocol suite, which is made of common concepts and communication protocols used over the internet about computers linked on a network. The internet protocol suite turns out vital in the modern day of wireless communications based on the foundational set of instructions or protocols that define the steps and procedures of wireless communication between two or more computers in a linked network. The communication unit defines the packets of data, transmission routes, addresses and destinations of information sent over a network. The communication entity is organized into four necessary layers classified by the related functionality in a connection case. The link layer is the lowest of the four abstraction layers and contains instruction on specific data that remains within one network segment.The internet layer is prec eded by the link layer and fundamentally in cooperates protocols responsible for internetworking between independent networks (Shang, W. et al. 2016). The transport layer is the third layer from the lowest and contains instructions essential in a host to host communications between linked machines while the application layer is the highest layer of the four layers and handles merely the process of data allocation and exchanged between active applications. The internet protocol suite significantly contributes to the success of many internet communications. However, there are various vulnerabilities in the communication entity that often compromises many connected users over the internet. Address Resolution protocol spoofing turns out one of the weaknesses associated with the transmission control protocol and internet address.The Address Resolution Protocol spoofing involves falsified messages send over a local area network which in turn results in a linking process of the attackers M edia Access Control with the Internet Protocol of a legitimate computer or an authenticated server in the local area network. Upon the false connect the malicious computer gets to accepts data and vita information intended for the mimicked internet address over the network. The ARP spoofing attack in many cases turns out fatal in cases of enterprise connections over the internet since vital information about classified operations falls into malicious machines and users. The vulnerability can enable malicious parties to intercept connection, stop in-transit data and even modify a link as well as connected users.Despite the devastating possibilities of the Address Resolution Protocol spoofing; there are possible detection, prevention and protection measures designed to detect and prevent a user in a case of the attack (Herrera, R. et al. 207). Additionally, advanced protection measure ensures related situations of the Address Resolution Protocol spoofing keep at bay from users in a lo cal area network. Avoiding trust relationships is one of the prevention measures, Packet filtering, however, significantly aid in detection and prevention operations in a network condition. The strategy involves filtering network packets sent from an IP address to ensure they match the address from which they came. The Use of ARP spoofing software, as well as cryptographic network protocols, further detect and prevent as well as protect against attacks from maliciously changed internet addresses in a local area network.Covert ChannelsThe integrity and consistency of user data have been a vital factor in many computer security strategies put up to ensure the security of user data and information from potential threats. However, some threats still pose problems in relation user data in many cases. Covert channel refers to an exceptional case of security attack that creates a possibility for the transfer of data and information between two processes that are not supposed to interact or communicate in a system governed by computer security policies. Basically, in 1973 the term was coined by Lampson about unintended service programs effects on systems loads. A covert channel in many cases stays hidden from the access control methods or mechanisms of a secure operating system based on the fact that covert channels do not use authentic access protocols recognized by the underlying operating system and hence remains undetected and uncontrolled by an operating system.There are two primary types of covert channel related attacks in typical system operation; Covert Storage channel and covert Timing Channel. Covert storage channels associate significantly to systems memory operations and therefore refers to an occurrence where system out-of-band information or data gets stored in massages for memory clearance and reuse by the underlying operating system (Maurice, C. et al. 2015). The covert storage channel attack, therefore, occurs when the messages or packets gets sent o ver a network with the messages still contained within, which occasionally tip off potential attackers of the processes that created the message. Similarly, certain data types of messages like the ICM...
Wednesday, June 3, 2020
College Board in Damage Control
College Board in Damage Control June 19 Many June SAT test-takers can take a day off from waterskiing this summer to retake the exam. So why cant College Board offer a retest this summer? After all, they made a big blunder on the June exam! Its the right thing to do. This week has not been the first week that we at Ivy Coach have been critical of College Board. Lets just say that College Board knows us well. Remember a couple of years ago when the College Board sent out cow stickers? We sure do. Well, weve got some more to say about the printing error on the June administration of the SAT. For those who dont read our college admissions blog every day as they eat their waffles and down glasses of freshly squeezed orange juice, there was a printing error on the June test and College Board ended up having to discard two sections of the exam. The testing company insists they will still be able to score the exam but many students and parents are up in arms.à One Long Island student even filed a legal claim against the company. College Board previously issued a statement that they would allow test-takers to take the October administration of the SAT as a makeup at no additional cost. Right. Thats like when Ironman canceled a race in Lake Tahoe, California at the very last minute with swimmers all in the water only to then charge the swimmers more to enter that same race the subsequent year. Its not like we speak from personal experience. Ok, we sure do. Anyhow, we asserted that such a response on the part of College Board was unacceptable. For many test-takers, its not about the fee. Its about the fact that they studied and prepared for this exam in June. And now they have to wait through the rest of June, July, August, September, and part of October to sit and take the next test? Its particularly unfortunate for students who intend to apply Early Decision or Early Action because they need to know their scores with expedience as their scores will likely influence where they choose to apply. Finding out a sc oreà so late in the game is far from ideal. And so we, along with other organizations like FairTest and other folks in the college admissions community, urged the College Board to not only waive the fee but to administer the exam over the summer months, so these students can re-take the test if they so choose while still fully prepared. But College Board has not yet listened. And so we shall not go silently into the night. We will continue to fight the good fight. We will. As reported yesterday by Examiners Nancy Griesemer in a piece entitled College Board goes into damage control mode, Struggling under increasingly urgent requests for clarity on their statement concerning the June 6 SAT, theà College Boardà issued this afternoon yet anotherà amendmentà to the policy regarding students who wish to take advantage of the offer for aà free re-test in October. As calls to the press office went unanswered, the College Board appeared to be going into damage control mode, while continuing to put together a piecemeal response toà timing and scoring problemsarising from the administration of the June test. College Board, its time to make a true, genuine concession and that concession is to offer the exam over the summer months. Youre a big company. Youre capable of doing it. We know it. Enough with the piecemeal responses, as Griesemer suggests. Its time to take some real, appropriate action. Its time to do right by your June test-takers. You owe it to them. You can do this. You can.
Subscribe to:
Posts (Atom)