ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Math Posted 23 Apr 2017 My Price 9.00

destination unreachable

I need help with the project atttached. 2 Problems question. I need someone very good. Please no plagiarism. please use screen shot on the project if you can or chart. Thanks

 

[15 points total] An ACK scan does not provide information about whether a target machine’sports are open or closed, but rather whether or not access to those ports is being blocked by afirewall. If there is no response or an ICMP “destination unreachable” packet is received as aresponse, then the port is blocked by a firewall. If the scanned port replies with a RST packet,that means the ACK packet reached its intended host. So the target port is not being filtered bya firewall. Note, however, even though ICMP went through, the port itself may be open orclosed.Describe at least 2 rules that could be used by Snort to detect an ACK scan. Clearly expressyour assumptions and explain your rules. Do you think Bro can do a better job of detecting anACK scan?[Part A 15 points, Part B 9 points, 24 points total] As shown in the above diagram, Kevin, thesystem admin, installed a text-message sender and a text-message receiver in a Multi-Level-Secure (MLS) environment. In the MLS environment, two security levels exist (i.e.,Unclassified (Low) and Classified (High) levels). His goal is to enforce the Bell-LaPadula (BLP)access control model in the network. Essentially, the BLP model defines two mandatory accesscontrol rules:●No Read Up Rule: a subject (Low) at a lower security level must not read an object (High) at ahigher security level. Simply, a Low entity cannot have read-access to a High object.●No Write Down Rule: a subject (High) at a higher security level must not write to any object(Low) at a lower security level. Simply, a High entity cannot have a write-access to a Lowobject.

Attachments:

Answers

(11)
Status NEW Posted 23 Apr 2017 01:04 PM My Price 9.00

-----------

Attachments

file 1492955158-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)