Thursday, September 12, 2019
Week 3_H Assignment Example | Topics and Well Written Essays - 750 words
Week 3_H - Assignment Example The attacker always tries to find a way to prevent the users from communicating, therefore the system administrators need to implement methods that are secure and that prevents the entry of unauthorized persons in to the network. The outside attacker tries to obtain the shared key to make attacks. This attack can be prevented by using robust authentication methods such as strong passwords. It is important also to test whether the server is broken so as to keep maximum protection for the system. Inside attackers are operators within the system who sniff passwords and receive the shared key. An insider attacker should be prevented from attacks by using antispyware software and malware software (Kate, et al., 2004). Attackers ordinarily use Trojans, malware and spyware to sniff-passwords that they use to receive the shared key (Mahalanobis, 2005). It is important that the network is clean of such applications. If x and y have the same value then the DHp will the key will be generated as a multiple of the new key factor x. DHP has key multiple resistance and therefore it will calculate the key value by first finding out the number of first user who selected the key. DHP has key resistance properties, it also is key independent and also process the security for the same key multiple
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.