Read: (1) Lesson 29 Notes

Read: (1) Lesson 29 Notes

<p> EC312 Homework 29 Name: ______Read: (1) Lesson 29 Notes </p><p>1. What is the underlying assumption between routers in the routing algorithms they use which makes it possible to conduct a Man-In-The-Middle (MITM) attack?</p><p>2. What three things can an attacker do to your network traffic in a Man-In-The-Middle (MITM) attack and what pillar of Information Assurance is affected during each? (a) </p><p>(b)</p><p>(c) 3. Forouzan, P18-25. Circle the router interfaces below to indicate how the packet is routed to its destination.</p><p>140.24.7.0/26 Destination Address: 140.24.7.42 m0 m3 m0 m2 140.24.7.64/26 m1 R1 R2 m2 m1</p><p>140.24.7.128/26 140.24.7.192/26</p><p>4. Two small size companies are to be combined into one medium-sized organization. If the first small-size company uses the IP address block 54.120.16.0/21 and the second uses the IP address block 54.120.24.0/21, what is the aggregate address block that can be used by the new medium-sized company? ??.??.??.??/??</p><p>54.120.16.0/21 54.120.24.0/21</p><p>1 5. An attacker is located on the 5.6.7.0/24 network and wants to prevent midshipmen from reaching a website at 8.8.8.26. He turns his computer into a router using Loki to advertise a false network to Router C.</p><p>(a) Construct the routing table for Router C.</p><p>(b) Looking at Router C’s routing table, what network address and mask should the attacker choose? </p><p>(c) Complete the routing table entry below with your answer from (b) and draw a line into Router C’s routing table showing where the attacker’s false network would go. 2 (d) What is the first and last IP address of the false network you chose for the evil instructor?</p><p>First Address:</p><p>Last Address:</p><p>(e) Does the IP address of the webserver fall within your choice for the evil instructor’s false network?</p><p>(f) Given your answer to part (e), whenever a midshipman sends a packet destined for the webserver at 8.8.8.26 where will Router C forward their packet? Will the midshipman ever be able to reach the important website?</p><p>(g) List and briefly describe two technical solutions that could be implemented on Router C to prevent the evil instructor from injecting false routing information.</p><p>Solution #1 ______:</p><p>Solution #2 ______:</p><p>(h) Who is responsible for implementing these security measures in a network?</p><p>3</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us