Applying Advanced Protocols
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
430
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by CorporalHummingbird3807
Brian Centers
ITT-430
May 5, 2023
Professor Stacy Wallace
Applying Advanced Protocols
When applying encryption algorithms and protocols, it benefits an organization by
scrambling information stored on documents and e-mails just before they are sent off to their
destination. With this data scrambled, should the document or e-mail get intercepted by an
outside adversary, it will be extremely difficult to decode the message. Specific protocols to
implement include RSA/SHA, 3DES and AES. These symmetric key encryptions allow for the
data to be altered by changing the meaning of a letter (for example, the letter “a” in a document
may be scrambled to mean the letter “z”), or they could add a key to the information which uses
complex mathematical equations and formulas to scramble the information.
The purpose of applying IPSec, or internet protocol security, to the servers is to help
protect data that is stored on the servers, especially private or sensitive data. Institutions such as
banks, government agencies, and hospitals, for example, store sensitive data that should not be in
the hands of the public by law. Also, organizations today are implementing IPSec to allow for a
virtual private network (VPN) on their networks. IPSec uses several protocols to help protect
data including an Internet Key Exchange (IKE), which allows for the security association (SA)
between two communicating hosts. Another protocol used by IPSec is an authentic header (AH),
which adds a header field to a packet being sent out of the network that contains a cryptographic
hash of the contents inside of the outgoing packet.
DNSSEC, or domain name system security extensions, contains a set of specifications
used for securing specific data or other information provided by the DNS. When DNS was first
implemented with the birth of the internet, its purpose was to direct a packet to a targeted path
without any security implications. When cyber-attackers learn to re-route packets to other
destinations they could control, DNSSEC was implemented to make sure that all packets were
being routed to the correct destination without interference from outside adversaries. One key
component of DNSSEC is Public Key Infrastructure (PKI), which allows for information stored
in documents or e-mails to be encrypted and shared to other users on other networks with public
and private keys. The sender uses a public key assigned to the recipient to send the encrypted
information, and the recipeint uses an assigned private key to open and extract the information
sent to them.
The implementation of the procedures used for this exercise helped secure the servers by
updating firewall settings and setting key encryption standards on the servers. When the internet
was first established, it was small in scope and not much implementation was enforced in regard
to security. As the internet became a large entity worldwide, cyber-attackers began to expose the
flaws that existed on computer networks and change was needed. Security measures such as
IPSec and DNSSEC were instituted to help keep cyber-attackers from obtaining data belonging
to organizations and their customers and employees. As e-mails became a vital communication
tool worldwide, DNSSEC allowed for the capability to digitally “sign” an e-mail to authenticate
the authenticity and the sender of the e-mail to the recipient (Grue, 2023).
The benefits of securing servers are immeasurable to an organization, but it can be a
strain to some smaller or low-profile organizations. The implementation of security protocols,
encryption, and secure firewall settings are not as simple as clicking a few buttons, as it does
require a specific skill set from a network administrator. Some organizations may be challenged
in finding a network administrator who can provide the best security for their network for
financial or other reasons, but in the technological world we live in today, they must make it a
priority to ensure the safety of their network, and the safety of the information they may be
storing that belongs to their customers and to their employees.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
REFERENCES
Grue, Robbie (2023). CISCO.com.
“What is DNSSEC and Why Is It Important?”.
https://umbrella.cisco.com/blog/what-is-dnssec-and-why-is-it-important.