Question

Recall that TCP has no security. If an application author wants to pass his messages to...

Recall that TCP has no security. If an application author wants to pass his messages to another process that can encrypt them, at what layer will that encryption (like TLS or SSL) be found?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

If an application author wants to pass his messages to another process that can encrypt them, then the encryption performed in Transport Layer. Transport Layer Security was designed to operate on top of reliable transport protocol such as TCP. However, It has also been adapted to run over datagrams protocols such as UDP. The TLS protocol is designed to provide three essential services to all applications running above it, and these three services are :-

Encryption: A mechanism to obfuscate what is sent from one host to another.

Authentication: A mechanism to verify the validity of provided identification material.

Integrity: A mechanism to detect message tampering and forgery.  

In order to establish a cryptographycally secure data channel, the connection peers must agree on which ciphersuites will be used and the key used to encrypt the data. The TLS protocol specifies a well defined handshake sequence to perform this exchange is called TLS Handshake. As part of the TLS handshake, the protocol also allows both peers to authenticate their identity. when used in the browser, this authentication mechanism allows the client to verify that the server is who it claims to be and not someone simply pretending to be the destination by spoofing its name or IP address. finally with encryption and authentication in place the TLS protocols also provides its own message authentication cod (MAC).

Add a comment
Know the answer?
Add Answer to:
Recall that TCP has no security. If an application author wants to pass his messages to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. ...

    Subject: Principles of Information Security True/False TLS is dead and SSL is the path forward. A signed applet can be hijacked. The spiral model is an iterative model designed to enable the construction of increasingly complex versions of a project. The generation of a real random number is a trivial task. Buffer overflow is one of the most common web attack methodologies. Compilers create runtime code that can be executed via an interpreter engine, like a Java virtual machine (JVM),...

  • Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of...

    Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of outbound traffic from 1:00am - 4:00am. Your company works a traditional 8:00am - 5:00pm and uses an in house backup solution. What could this be a sign of? Cloud backup Bad login information Aliens Data Exfiltration Which of the following can help protect against an insider threat? Select all that apply DLP Seperation of duties Aliens Job/Position rotation Social media can introduce considerable risk...

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in whic...

    In this assignment, you design a simple chat room in the form of a network application which uses the services of a TCP/IP computer network. Your design should have a clientserver architecture in which the server is multi-threaded. Then, you need to implement the server-side of the chat-room application in Java (implementing the client-side is optional). The server maintains a list (an ArrayList will work well) of all the active connections. It will listen on a port for a new...

  • Some cryptography and a little computer security. You find an odd DeLorean parked around the corner....

    Some cryptography and a little computer security. You find an odd DeLorean parked around the corner. Realizing that Doc Brown has left the keys in the ignition, you decide that a quick trip back to Rome in 40 BC is in order. A few mint condition coins, and possibly a picture of Vincengetorix will be highly remunerative. As usual, the car fails and you are stranded. All is not lost, Julius Caesar recruits you for his secret service as a...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • @ See page 74 02 Question (5 points) Hugo carefully divides his spending into things he needs and things he wants, and...

    @ See page 74 02 Question (5 points) Hugo carefully divides his spending into things he needs and things he wants, and he has quasilinear preferences over both goods. His preferences can be represented by the function u(x, y) = 4x + y, where x represents needs and y represents wants. Hugo faces a price of $12 for needs and $36 for wants; he has income of $180. 1st attempt Part 1 (2 points) O See Hint The graph below...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT