Explain the difference between passive and active attacks on a network. Give an
ID: 3689828 • Letter: E
Question
Explain the difference between passive and active attacks on a network. Give an example of each.
Which headers are left in plaintext when we use link encryption? Network encryption? Application encryption?
How is end-to-end encryption different from other types of encryption? At what layer does it take place?
Describe the SSL key negotiation in terms of the keying techniques introduced in Section 14.2.
Explain how the different IPsec modes apply encryption either above or below the IP layer Describe WEP2 key negotiation in terms of the keying techniques introduced in Section 14.2.
Explanation / Answer
what is section 14.2 i didnt get
1)
A passive attack is one in which the intruder eavesdrops but does not modify the message stream in any way
Examples of passive attacks are:
network analysis, eavesdropping and traffic analysis.
An active attack is one in which the intruder may transmit messages, replay old messages, modify messages in transit, or delete selected messages from the wire.
Note:
In active attack intruder acts as a man in middle
An example of an active attack is a denial of service attack
2)
A network encryption because it is the only way you can route a packet through protocol stacks is if the appropriate packet headers remain in plaintext
3)
End to-end encryption takes place in the data link layer and the physical layer
>End-to-end encryption solves the problem by ensuring your message remains encrypted from the time you send it to the time it is received. Any servers it touches on the way to its destination won’t be able to read it, as they will have no way to decrypt it — only the intended recipient will be able to use their key to decrypt your message
>While with the other encryption they can’t guarantee that your data is being transmitted between servers securely. While your data might be secure when it leaves your computer, there’s no guarantee that it will remain that way on its journey to the intended recipient’s computer.so this is the main difference between the end to end and the other types.
>Using end-to-end email encryption makes it less likely for your information to be intercepted by hostile third parties on the Internet.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.