The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Ok, so I started to respond  to the statement in italics. I just need help with finishing my response in Bold. Can you please respond to Italics so I my craft my answer. I just need 130 words with two APA citations.Â
Â
Â
Routing Information Protocol(RIP) is used to distribute routing information such as shortest paths within networks and advertising routes out from the local network. In the absence of strong authentication enforcement and verification mechanism, routing information comes from the peer router can be spoofed or modified by a malicious user. A malicious user may also corrupt or change routing tables of the router. This could result in redirection of network traffic, excessive bandwidth consumption or potential denial of service on the router and the routing protocol. An attacker could also use RIP attack to impersonate any host by causing all traffic sent to that host to be reached at the attacker's machine instead (Sanzgiri et.el., 2002). Since password authentication of routing protocols is sent in a cleartext format between routers, it can be easy for an attacker to subvert this security control. However, by adding "MD5 hash capabilities to the authentication process, routing updates are no longer contain cleartext passwords, and the contents of the routing update are more resistant to tampering" (MazeLabs, 2013). Routing protocol authentication is the most important step to prevent RIP attack. In addition to that, it is important to add secure password authentication with the use of MD5 hashing. Other measures to ensure security of routing information protocol operation should include configuration of infrastructure access control lists, route filtering to reduce the possibility of introducing false routing information in the network, and limits the number of routing prefixes (Cisco, n.d).
Although the use of RIP has decreased in the past decade and is rarely used in modern networks, it is still important to your networking studies because it might be encountered in a network implementation. There are three versions of the Routing Information Protocol: RIPv1, RIPv2, and RIPng when you are talking about RIP which one are you referring too?  As it is one of a few distance-vector routing protocol by adding "MD5 hash capabilities to the authentication process does this effect have the same effect say on Interior Gateway Routing Protocol (IGRP by Cisco?