CIS288-Mod11-Project-Andrew

docx

School

Pima Community College *

*We aren’t endorsed by this school

Course

CIS-288

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

5

Uploaded by SuperHumanArtPorcupine7

Report
Feng 1 Andrew Feng Jennifer G. Johnson CIS288-CRN#11535 11/07/2023 Module 11 Project Screenshots 1. Windows Firewall with Advanced Security 2. Creating a New Connection Security Rule
Last Name 2 3. Monitoring IPsec Connections Main Mode
Last Name 3 Quick Mode Questions and answers: 1. What protocols are used in the IPsec standard? Authentication Header (AH): AH is typically used when confidentiality (encryption) is not required. Encapsulating Security Payload (ESP): ESP is the most commonly used protocol within IPsec. Internet Key Exchange (IKE): There are two versions of IKE: IKEv1 and the newer IKEv2. Security Associations (SA): SAs help ensure that both ends of the connection have the same configuration. 2. At which level of the OSI model does IPsec operate? IPsec operates at Layer 3(the network layer) of the OSI model. It is specifically designed to provide security services for IP packets, which means it functions at a level that is independent of the higher-layer protocols and applications. IPsec is used to secure the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Last Name 4 communication between network devices, such as routers, firewalls, and endpoints, by adding a layer of security to the IP packets themselves. This allows it to protect the integrity, confidentiality, and authenticity of data being transmitted across IP networks. 3. With regard to authentication, what are the three options for Requirements? Something You Know: Users must provide the correct information to prove their identity. Examples include passwords, PINs, and answers to security questions. Something You Have: The user must possess the required item or device. Common examples include smart cards, security tokens, mobile devices, or physical keys. Something You Are: Authentication is established by comparing the presented biometric data with previously recorded data for the authorized user. Like: fingerprints, retinal scans, facial recognition, voice recognition, and even behavioral patterns like typing rhythm 4. Describe the difference between “integrity” and “confidentiality” as it relates to IPsec. Integrity: Integrity in IPsec refers to the assurance that data has not been tampered with during transmission. It ensures that the data remains unaltered and unchanged from the sender to the receiver. To achieve integrity, IPsec uses the Authentication Header (AH) protocol, which adds a digital signature to each IP packet. This signature is based on the packet's content and a shared key between the sender and the receiver. If an attacker attempts to modify the data in transit, the recipient will detect the alteration when verifying the digital signature, and the packet will be rejected. Confidentiality: Confidentiality in IPsec pertains to the protection of data from unauthorized access or viewing by third parties. It ensures that the content of the data remains private and cannot be read by eavesdroppers. To achieve confidentiality, IPsec uses the Encapsulating Security Payload (ESP) protocol, which encrypts the payload of IP packets. Encryption scrambles the data in such a way that only the authorized recipient can decrypt and read it using the appropriate decryption key.
Last Name 5 Even if an attacker intercepts the encrypted data, they should not be able to decipher it without the decryption key.