Question: Consider a routing environment within a large, public sector security-conscious organisation; all traffic leaving its AS is encrypted using a variety of techniques including SSL,
Consider a routing environment within a large, public sector security-conscious organisation; all traffic leaving its AS is encrypted using a variety of techniques including SSL, encrypted ZIP files and VPN end-points. There are two ISPs providing connectivity across the Internet and no private network links are used.
List and describe any architectural weaknesses that could cause a loss of confidentiality; describe the layer in which the weakness occurs and suitable mitigations to reduce or eliminate the weaknesses
If encrypted traffic is dropped by one ISP, list and describe the steps required to have the second ISP carry the traffic without packet loss. Assume that there are no pre-existing peering agreements relating to the carriage of encrypted traffic with the second ISP
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
