Question: As we discussed in class, many services like for example email and chats are now being done over HTTP and https protocols. Now network security

As we discussed in class, many services like for example email and chats are now being done over HTTP and https protocols. Now network security admins have a problem in the sense that these services are increasingly encrypted with sophisticated technologies, and the ability to process packets goes down. Let us assume that you are one such admin. Your company (rightly so) does not want you to write programs executing on employee computers to monitor what employees send and receive over the Internet due to privacy expectations. Things like capturing user screens, key stroke loggers are not allowed. What you can monitor though is router/ firewall traffic, since that is off limits to employees. In this case, do you completely give up logging packets at router side due to encryption, or is there some use to logging IP packets at the router for security purposes. Please justify keeping common attacks we saw in class in mind. Recall how a packet at the router looks like below. The payload is the actual data portion (most likely encrypted).

As we discussed in class, many services like for example email and

Version Length Service Type Packet Length Identification DF MF Fragment Offset Time To Live Transport Header Checksum SENDER IP ADDRESS (32 Bits) DESTINATION IP ADDRESS (32 Bits) Options Padding PAYLOAD Version Length Service Type Packet Length Identification DF MF Fragment Offset Time To Live Transport Header Checksum SENDER IP ADDRESS (32 Bits) DESTINATION IP ADDRESS (32 Bits) Options Padding PAYLOAD

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!