Question: Consider a routing environment within a large, public sector security-conscious organisation; all traffic leaving its AS is encrypted using a variety of techniques including SSL,

Consider a routing environment within a large, public sector security-conscious organisation; all traffic leaving its AS is encrypted using a variety of techniques including SSL, encrypted ZIP files and VPN end-points. There are two ISPs providing connectivity across the Internet and no private network links are used.

List and describe any architectural weaknesses that could cause a loss of confidentiality; describe the layer in which the weakness occurs and suitable mitigations to reduce or eliminate the weaknesses

If encrypted traffic is dropped by one ISP, list and describe the steps required to have the second ISP carry the traffic without packet loss. Assume that there are no pre-existing peering agreements relating to the carriage of encrypted traffic with the second ISP

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!