Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

I have sensitive file deliveries to a high-profile client on a regular weekly in

ID: 673567 • Letter: I

Question

I have sensitive file deliveries to a high-profile client on a regular weekly interval. I suspect that someone is doing passive analysis on my data communication on my system so I decide to encrypt all of my data and data transmission to prevent any passive analysis of my data. If I encrypt all of my data and transmissions, have I protected myself from passive attacks? Explain why or why not? I have sensitive file deliveries to a high-profile client on a regular weekly interval. I suspect that someone is doing passive analysis on my data communication on my system so I decide to encrypt all of my data and data transmission to prevent any passive analysis of my data. If I encrypt all of my data and transmissions, have I protected myself from passive attacks? Explain why or why not? I have sensitive file deliveries to a high-profile client on a regular weekly interval. I suspect that someone is doing passive analysis on my data communication on my system so I decide to encrypt all of my data and data transmission to prevent any passive analysis of my data. If I encrypt all of my data and transmissions, have I protected myself from passive attacks? Explain why or why not?

Explanation / Answer

Passive Analysis: In this attack the some one may analyzes traffic or determine location or identify communicating hosts or observes the frequency and length of message being exchanged.

2. Using these information someone can predict the nature of communication . All incoming and out going traffic of network is analysed but not altered.

Passive analysis are very difficult to detect because they do not involve any alteration of the data. When the messages are exchanged neither the sender nor the receiver is aware that a third party has read the messages. This can be prevented by encryption of data.

Use of Strong encryption algorithms can protects from passive attacks because even though the message is read they will be in encrypted format.