Solutions for the Third Problem Set

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

A CASE FOR REDUNDANT ARRAYS OF INEXPENSIVE DISKS (RAID) D. A. Patterson, G. A. Gibson, R. H. Katz University of California, Berkeley.
A less formal view of the Kerberos protocol J.-F. Pâris.
KERBEROS A NETWORK AUTHENTICATION PROTOCOL Nick Parker CS372 Computer Networks.
Authentication Applications The Kerberos Protocol Standard
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
XtremIO Data Protection (XDP) Explained
Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Solutions for the Second Problem Set COSC 6360 Fall 2014.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Wide-area cooperative storage with CFS
Introduction to client/server architecture
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Slide Master Layout Useful for revisions and projector test  First-level bullet  Second levels  Third level  Fourth level  Fifth level  Drop body.
Review Session for Fourth Quiz Jehan-François Pâris Summer 2011.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Copyright © 2014 EMC Corporation. All Rights Reserved. SnapView Snapshot Upon completion of this module, you should be able to: Describe SnapView Snapshot.
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
Module 5: Designing Security for Internal Networks.
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
COSC 3330/6308 Solutions to the Third Problem Set Jehan-François Pâris November 2012.
Solution to the Third COSC 6360 Quiz for Fall 2013 Jehan-François Pâris
Yet another Pop Quiz COSC 6360 Fall The rules On any sheet of paper, please write  You full name, first name first  Today's date  Your answers.
Example 1 Writing Powers Write the product as a power and describe it in words. a. 44= to the second power, or 4 squared 9 to the third power,
Solutions for the Fourth Problem Set COSC 6360 Fall 2014.
Solution to the Second COSC 6360 Quiz for Fall 2013 Jehan-François Pâris
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
1 Example security systems n Kerberos n Secure shell.
Solutions for Fourth Quiz COSC 6360 Fall First question What do we mean when we say that NFS client requests are: (2×10 pts)  self-contained? 
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
CS Introduction to Operating Systems
Intrusion Tolerant Architectures
File Share Dependencies
Security and Administration Transparencies
Solutions for Fourth Quiz
Radius, LDAP, Radius used in Authenticating Users
Use cases for names and EPRs
Unit OS10: Fault Tolerance
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
Solutions for Second Quiz
How to Check if a site's connection is secure ?
Introduction to Networks
SSSD and OpenSSH Integration
Data Networking Fundamentals
Introduction to client/server architecture
Solution to the Fourth COSC 6360 Quiz for Fall 2013
2018 Real Dell EMC E Exam Questions Killtest
Chapter 27: System Security
How to Protect Big Data in a Containerized Environment
Goals Introduce the Windows Server 2003 family of operating systems
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Kerberos.
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Kerberos Part of project Athena (MIT).
KERBEROS.
Solutions for Third Quiz
Questions on Fifth Quiz
Solutions for Third Quiz
Solutions to the Second Quiz
Security.
Computer Networks Presentation
COEN 351 Authentication.
Improving performance
Presentation transcript:

Solutions for the Third Problem Set COSC 6360 Fall 2014

First question What is the function of the i-node map in a log-structured file system? (10 points)

Answer What is the function of the i-node map in a log-structured file system? (10 points) The i-node map contains the addresses of the i-node blocks. Required because i-nodes do not reside at fixed positions on the disk.

Second question How would you modify the Kerberos protocol to provide secure encrypted communication between the client’s workstation and the server it accesses? (20 points)

Answer How would you modify the Kerberos protocol to provide secure encrypted communication between the client’s workstation and the server it accesses? (20 points) It would be trivial because the client c and the server s already share a secret key Kc,s This key could be use to encrypt all messages between the client c and the server s

Third question—Part A Explain how SSH provides mutual authentication between the client’s workstation and the server. (10 points)

Answer Explain how SSH lets the client’s workstation authenticate the server it attempts to connect to. (10 points) When the client contacts a server, the server replies with its public host key and its public server key Client can check whether the public host key is the same key as the one it was provided

Third question—Part B Under which circumstances is this not possible? (20 points)

Answer Under which circumstances is this not possible? (20 points) Whenever the client cannot consult a trusted list of servers' public keys By far the most frequent case!

Fourth question Over the last five to ten years, many corporations have replaced their RAID level 5 disk arrays by RAID level 6 arrays even when handling double disk failures was not considered a major issue. Can you explain this paradox? (20 points)

Answer Over the last five to ten years, many corporations have replaced their RAID level 5 disk arrays by RAID level 6 arrays even when handling double disk failures was not considered a major issue. Can you explain this paradox? (20 points) They want to protect their data against a single disk failure and the presence of irrecoverable read errors on the other disks.

Fifth question A RAID level 6 array has ten 2TB disks. What is its actual storage capacity? (5 points) Answer: ____ Terabytes How many write operations will the array perform when we update a single data block? (5 points) Answer: ____ write operations

Answer A RAID level 6 array has ten 2TB disks. What is its actual storage capacity? (5 points) Answer: (10- 2)×2 = 16 Terabytes How many write operations will the array perform when we update a single data block? (5 points) Answer: three write operations (a data block and two parity blocks)

Sixth question According to Shah et al., what is the best chunk selection policy within the sliding window of their policy? (10 points)

Answer According to Shah et al., what is the best chunk selection policy within the sliding window of their policy? (10 points) Rarest first