Applying Advanced Protocols

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

430

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by CorporalHummingbird3807

Report
Brian Centers ITT-430 May 5, 2023 Professor Stacy Wallace Applying Advanced Protocols
When applying encryption algorithms and protocols, it benefits an organization by scrambling information stored on documents and e-mails just before they are sent off to their destination. With this data scrambled, should the document or e-mail get intercepted by an outside adversary, it will be extremely difficult to decode the message. Specific protocols to implement include RSA/SHA, 3DES and AES. These symmetric key encryptions allow for the data to be altered by changing the meaning of a letter (for example, the letter “a” in a document may be scrambled to mean the letter “z”), or they could add a key to the information which uses complex mathematical equations and formulas to scramble the information. The purpose of applying IPSec, or internet protocol security, to the servers is to help protect data that is stored on the servers, especially private or sensitive data. Institutions such as banks, government agencies, and hospitals, for example, store sensitive data that should not be in the hands of the public by law. Also, organizations today are implementing IPSec to allow for a virtual private network (VPN) on their networks. IPSec uses several protocols to help protect data including an Internet Key Exchange (IKE), which allows for the security association (SA) between two communicating hosts. Another protocol used by IPSec is an authentic header (AH), which adds a header field to a packet being sent out of the network that contains a cryptographic hash of the contents inside of the outgoing packet. DNSSEC, or domain name system security extensions, contains a set of specifications used for securing specific data or other information provided by the DNS. When DNS was first implemented with the birth of the internet, its purpose was to direct a packet to a targeted path without any security implications. When cyber-attackers learn to re-route packets to other destinations they could control, DNSSEC was implemented to make sure that all packets were being routed to the correct destination without interference from outside adversaries. One key
component of DNSSEC is Public Key Infrastructure (PKI), which allows for information stored in documents or e-mails to be encrypted and shared to other users on other networks with public and private keys. The sender uses a public key assigned to the recipient to send the encrypted information, and the recipeint uses an assigned private key to open and extract the information sent to them. The implementation of the procedures used for this exercise helped secure the servers by updating firewall settings and setting key encryption standards on the servers. When the internet was first established, it was small in scope and not much implementation was enforced in regard to security. As the internet became a large entity worldwide, cyber-attackers began to expose the flaws that existed on computer networks and change was needed. Security measures such as IPSec and DNSSEC were instituted to help keep cyber-attackers from obtaining data belonging to organizations and their customers and employees. As e-mails became a vital communication tool worldwide, DNSSEC allowed for the capability to digitally “sign” an e-mail to authenticate the authenticity and the sender of the e-mail to the recipient (Grue, 2023). The benefits of securing servers are immeasurable to an organization, but it can be a strain to some smaller or low-profile organizations. The implementation of security protocols, encryption, and secure firewall settings are not as simple as clicking a few buttons, as it does require a specific skill set from a network administrator. Some organizations may be challenged in finding a network administrator who can provide the best security for their network for financial or other reasons, but in the technological world we live in today, they must make it a priority to ensure the safety of their network, and the safety of the information they may be storing that belongs to their customers and to their employees.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
REFERENCES Grue, Robbie (2023). CISCO.com. “What is DNSSEC and Why Is It Important?”. https://umbrella.cisco.com/blog/what-is-dnssec-and-why-is-it-important.