Preview

Nt1330 Unit 3.1 Essay

Satisfactory Essays
Open Document
Open Document
488 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1330 Unit 3.1 Essay
3.1. Other Methods 3.1.1. Trusted Certificate Authority (CA)
CAs are used to issue trusted certificates, digital signatures or keys to the person using it. This way we can have systems in place that’ll revoke any certificate coming from a non-trusted source (Truth, S, 2011). For example, an attacker may have generated their own key or certificate but it isn’t recognised as a trusted source and therefore our systems can deny it. 3.1.2. Latency Examination
By monitoring the time for messages to be sent between the communicators we can further secure our communications. For instance if we are using some form of encryption and someone is performing a MITM attack they may be using a program to crack and decipher our encrypted messages, then performing any modifications they wish to make
…show more content…
Honeypot
A honeypot is effectively a trap for potential attackers. Generally it’s a computer isolated from your network that is setup to look like it is part of the network and is designed to appear as though it contains important information. Desirably this’ll draw the attention of attackers. By having a honeypot you can monitor it so you can detect attackers faster and don’t require performance taxing protocols running on all of your systems in your network. Hopefully those wishing to snoop your network will be focused towards your honeypot and then you can monitor the attacker and reduce potential impact from them (Wikipedia - Honeypot, 2015).
4. Conclusion
MITM attacks are difficult to avoid because even if they are occurring you do not often know about them. The best we can do is mitigate the chance of them occurring by making it more difficult for attackers by using cryptographic techniques. This can then be followed up with other techniques to further enhance the secureness and private-ness of our communications. We want to protect against MITM attacks to keep our sensitive data private and avoid any negative implications that releasing this data may

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It would take 3 (hop) messages to send a message from node D to node A. One additional link would be required to add a new node E between node C and node B. The added node E will increase the number of actual messages required to be sent form one node to another.…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    Honey pot is a closely monitored decoy system. It traces the network attacks. It can distract from more valuable targets and gather forensic evidence from the attackers and their techniques.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called “levels”. These levels map loosely to the Open Systems Interconnect (OSI) 7 layer model defined by the international standards organisation .…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Quiz Essay

    • 5533 Words
    • 23 Pages

    | ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer…

    • 5533 Words
    • 23 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Exercise 1

    • 421 Words
    • 2 Pages

    Teacher asks the child, “Do you remember what is this land and form?” Get the child to place the model at the top left of the mat.…

    • 421 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    * Domain members rely heavily on DNS services to locate domain resources. For example, when a domain-joined computer boots, it queries domain Service Locator records (SRV) in DNS to locate a Domain Controller against which to authenticate. Without a local DNS instance, this process has to take place over a potentially slow site link. Of course, once a computer has located a Domain Controller, it will continue to authenticate against that server until it something forces the client to find another DC.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1210 Lab 3.1 Essay

    • 453 Words
    • 2 Pages

    At the point when information is transmitted between two separate has the OSI process must be differentiated and sent in distinctive portions. Consequently the accepting host must get these sections. The deencapsulation is the methodology differentiating the information into workable stages that the accepting host can transform in place for the application to translate it legitimately.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Designing a fault-tolerant system can be done at different levels of the software stack. We call general purpose the approaches that detect and correct the failures at a given level of that stack, masking them entirely to the higher levels (and ultimately to the end-user, who eventually see a correct result, despite the occurrence of failures). General-purpose approaches can target specific types of failures (e.g. message loss, or message corruption), and let other types of failures hit higher levels of the software stack. In this section, we discuss a set of well-known and recently developed protocols to provide general-purpose fault tolerance for a large set of failure types, at different levels of the software stack, but always below the…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Good Essays

    It is major to see that private broadband speed ask for has an immensely fluctuating character. Families move stunningly in their centrality of usage, the kind of occupations they use their relationship for and the measure of progress these applications make. In this consider, we address this respectable mix by constraining between different groupings of customers, and our general outcomes are midpoints over these outlines. While the advance of the intensity for exchange speed is related to that of download speeds, their improvements are not by any associate of the creative vitality poorly characterized. Despite phenomenal things, download speeds are from time to time more desperate to customers as they are dependably holding up to use substance or use an application, while they are normally less squashed while exchanging data.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Study Essay

    • 3921 Words
    • 16 Pages

    |Stop Words: |Words that are filtered out prior to or after processing of natural language data (i.e., text) |…

    • 3921 Words
    • 16 Pages
    Good Essays
  • Satisfactory Essays

    There is a partition of the groups $\{ \mathcal{Q}, \mathcal{N} \setminus \mathcal{Q}\}${Q,N∖Q} of $ \mathcal{N}$N with $Q=\#\mathcal{Q}$Q=#Q such that \[\begin{align}…

    • 533 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Essay

    • 604 Words
    • 3 Pages

    I believe that the importance of correct programming and setting up of part is very important in today’s CNC manufacturing world as you are producing very precise components that need to be produced first time, every time or this is bad news for the company because of loss profits, scrap material and expensive repair costs. So ensuring correct programming and setting up of CNC machines is critical.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 4 Essay

    • 1197 Words
    • 5 Pages

    Complete the necessary documentation relating to customer problems and solutions Unit 2.4Describe the types of information customers require in Resort Unit 2 2.1…

    • 1197 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacks--attempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation, 2009)…

    • 601 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays