Assignment – Encryption and Authentication Methods Objectives Understand encrypt

Assignment – Encryption and Authentication Methods
Objectives
Understand encryption and authentication methods
Describe encryption and authentication methods
Contrast among encryption and authentication
Questions
Synthesize major characters of each protocol into the table below.
Using the given information as a hint and fill up those missing fields under Type, Primary Use(s), and
Notes columns. Except for the Notes column, you can get the hints from the information given for the three columns.
For the column, Notes, you need to provide a summary for each security method. Refer to the TLS row. It says that TLS provides a secure transmission of HTTP sessions.
Security Method
Type
Primary Use(s)
Notes
IPsec
Encryption
TCP/IP transmissions
SSL
TCP/IP transmissions
TLS
Secure transmission of HTTP sessions
PPP
Connection
Remote Access
SSH
Connection, Authentication, Encryption
RDP
VNC
L2TP
Tunneling
VPN
GRE
VPN
OpenVPN
IKEv2
VTP
Trunking
SHA
Hashing
Data Integrity
LDAP
Authentication
Directory Access
Kerberos
Client validation
Verify the identity of clients and securely exchange information after a client logs on a system
RADIUS
Central authentication point for network users, including wireless, mobile, and remote users
TACACS+
AAA (Authentication, Authorization, and Accounting)
Client validation and monitoring
EAP
Client verification
802.1X
AES
Wi-Fi and other uses
Hint
Utilize those given hints in the table to answer those missing ones.

follow the instructions carefully+ I have already have it until 12, I want u to

follow the instructions carefully+ I have already have it until 12, I want u to do the rest. I want steps 13 as soon as possible the rest can be later. What i mean about as soon as possible is hours from the time of posting this 🙂
thanks! Can not wait to work with u
i also can show u examples of the steps from 1-12 that I have done

follow the instructions carefully+ I have already have it until 12, I want u to

follow the instructions carefully+ I have already have it until 12, I want u to do the rest. I want steps 13 as soon as possible the rest can be later. What i mean about as soon as possible is hours from the time of posting this 🙂
thanks! Can not wait to work with u

You can find the PDF file “2023 Stte of Malware” prepared by Malwarebytes below.

You can find the PDF file “2023 Stte of Malware” prepared by Malwarebytes below. Provide five major takeaways after reading this report.
2023 State of Malware

Submission
Upload your work in a Microsoft Word document (10 points
must be in apa format

Q1 -Consider a network with a data rate of 10 Mbps. Messages sent on this networ

Q1 -Consider a network with a data rate of 10 Mbps. Messages sent on this network have a maximum size of 1000 bits, including a 16-bit control field.
Q2- Explain the structural dissimilarities between coaxial cables and twisted-pair cables and discuss the advantages of coaxial cables in transmitting higher frequency signals.
Q3-Compare between the following two channelization protocols:
Q4-Explain the evolution of Ethernet standards from its inception to the modern era, covering Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. Discuss the technological advancements, key differences, and the impact of each iteration on network capabilities.

You can find the PDF file “2023 Stte of Malware” prepared by Malwarebytes below.

You can find the PDF file “2023 Stte of Malware” prepared by Malwarebytes below. Provide five major takeaways after reading this report.
2023 State of Malware

Submission
Upload your work in a Microsoft Word document (10 points
must be in apa format

Q1 -Consider a network with a data rate of 10 Mbps. Messages sent on this networ

Q1 -Consider a network with a data rate of 10 Mbps. Messages sent on this network have a maximum size of 1000 bits, including a 16-bit control field.
Q2- Explain the structural dissimilarities between coaxial cables and twisted-pair cables and discuss the advantages of coaxial cables in transmitting higher frequency signals.
Q3-Compare between the following two channelization protocols:
Q4-Explain the evolution of Ethernet standards from its inception to the modern era, covering Standard Ethernet, Fast Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. Discuss the technological advancements, key differences, and the impact of each iteration on network capabilities.

Hartbleed attack. This sample question is to check if you could do the hartbleed

Hartbleed attack. This sample question is to check if you could do the hartbleed attack.If you’re able to do that I’ll create a question with the price that you ask. Thank you.
Overview
The Heartbleed bug (CVE-2014-0160) is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL/TLS to keep the connection alive. The objective of this lab is for students to understand how serious this vulnerability is, how the attack works, and how to fix the problem. The affected OpenSSL version range is from 1.0.1 to 1.0.1f. The version in the SEEDUbuntu 12.04 VM is 1.0.1.
Part 1
You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising. Please also list the important code snippets followed by explanation. Simply attaching code or screen shots without any explanation will not receive credits. Make sure you explain all your work even the sudo and Unix commands. Make sure you have detailed understandable explanation.
You can download the lab file from:
Part 2
Answer the following questions based on your assignment 5 submission and understanding and relate your answers:
1.What is the purpose of the Heartbeat protocol based on your part 1 report?
2.Describe what the mistake is in the Heartbleed vulnerability.
3.What lesson do you learn from this vulnerability?
4.The figure shows where a malicious Heartbeat request packet is stored in the memory after it is received. The payload length field contains 0x700. Please in detailed explanation describe which credit card numbers will be stolen by the attacker.
5.Assume that the Heartbeat implementation uses the actual payload length when allocating memory for the response packet (i.e., the memory for the response packet will the same size as that for the request packet). However, during the memory copy, the claimed payload length is used. What kind of security problems does it have?
Important Note: You need to show the full screenshot of the terminal window with detailed explanation of code and commands failing to do so you will not be graded and lose 75% of the grade.