What is the difference between tkip and ccmp


Assignment: Cyber Security And Network Security

SUBJECT 1: Cyber Security Planning

QUESTION 1:

Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital

Explain which systems you feel are mission critical. Then explain how the loss of these systems would affect the organization.

QUESTION 2:

Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience.

Explain what type of message it was and what you did to get rid of it.

QUESTION 3:

What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer.

QUESTION 4:

Go online and search for information about companies that have been harmed or bankrupted by a disaster.

Choose one such company and create a brief case study about it.

Successful narratives will focus on the manner in which the organization was impacted, including financial losses, losses of sales, or the need for lay-offs.

Your assignment should be 3-4 paragraphs in length.

QUESTION 5:

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives.

Some businesses require employees to use clear or see-through backpacks when carrying personal items.

What other devices might not be allowed in certain facilities, and why would they be restricted?

The video on Google's Data Center may give you some ideas to write about for this assignment.

SUBJECT 2: NETWORK SECURITY

Question 1. What protocols comprise TLS?

Question 2. What is the difference between a TLS connection and a TLS session?

Question 3. List and briefly define the parameters that define a TLS session state.

Question 4. List and briefly define the parameters that define a TLS session connection.

Question 5. What services are provided by the TLS Record Protocol?

Question 6. What steps are involved in the TLS Record Protocol transmission?

Question 7. What is the purpose of HTTPS?

Question 8. For what applications is SSH useful?

Question 9. List and briefly define the SSH protocols.

Question 10. What is the basic building block of an 802.11 WLAN?

Question 11. Define an extended service set.

Question 12. List and briefly define IEEE 802.11 services.

Question 13. Is a distribution system a wireless network?

Question 14. How is the concept of an association related to that of mobility?

Question 15. What security areas are addressed by IEEE 802.11i?

Question 16. Briefly describe the five IEEE 802.11i phases of operation.

Question 17. What is the difference between TKIP and CCMP?

Question 18. What is the difference between RFC 5321 and RFC 5322?

Question 19. What are the SMTP and MIME standards?

Question 20. What is the difference between a MIME content type and a MIME transfer encoding?

Question 21. Briefly explain base64 encoding.

Question 22. Why is base64 conversion useful for an e-mail application?

Question 23. What is S/MIME?

Question 24. What are the four principal services provided by S/MIME?

Question 25. What is the utility of a detached signature?

Question 26. What is DKIM?

Question 27. What services are provided by IPsec?

Question 28. What parameters identify an SA and what parameters characterize the nature of a particular SA?

Question 29. What is the difference between the transport mode and tunnel mode?

Question 30. What is a replay attack?

Question 31. Why does ESP include a padding field?

Question 32. What are the basic approaches to bundling SAs?

Question 33. What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: What is the difference between tkip and ccmp
Reference No:- TGS03023218

Expected delivery within 24 Hours