Tuesday, June 18, 2019

Week 3_H Assignment Example | Topics and Well Written Essays - 750 words

Week 3_H - Assignment ExampleThe attacker always tries to find a way to interdict the users from communicating, therefore the system administrators need to implement methods that are secure and that prevents the entry of unauthorized persons in to the network.The outside attacker tries to obtain the shared spot to tie attacks. This attack can be prevented by using robust authentication methods such as strong passwords. It is important also to test whether the server is disordered so as to keep maximum protection for the system.Inside attackers are operators within the system who sniff passwords and receive the shared cay. An insider attacker should be prevented from attacks by using antispyware software and malware software (Kate, et al., 2004). Attackers ordinarily use Trojans, malware and spyware to sniff-passwords that they use to receive the shared key (Mahalanobis, 2005). It is important that the network is clean of such applications.If x and y have the same value then the DHp will the key will be generated as a multiple of the new key factor x. DHP has key multiple resistance and therefore it will calculate the key value by first finding out the number of first user who selected the key. DHP has key resistance properties, it also is key independent and also process the security for the same key multiple

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.