UNDERSTAND THE ADVANTAGES AND DISADVANTAGES OF INT

UNDERSTAND THE ADVANTAGES AND DISADVANTAGES OF INTERNET PRIVACY TECHNOLOGIES

The primary theme of the paper is UNDERSTAND THE ADVANTAGES AND DISADVANTAGES OF INTERNET PRIVACY TECHNOLOGIES in which you are required to emphasize its aspects in detail. The cost of the paper starts from $109 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.

Question 5. Internet Privacy [11 marks]

 

Encryption is commonly used to provide data confidentiality in the Internet: when two hosts communicate, other entities in the path between the two hosts cannot read the data being sent. However encryption on its own does not privacy of who is communicating. Although the other entities cannot read the data, they can determine which two hosts are communicating.

 

Consider a simple view of an Internet path where client C is communicating using IPv4 with server S. There are routers on the path. Assume a malicious user, who wants to know information about who is communicating and when, has access to one of the routers in the path (router Rm), e.g. they can capture packets on that router. Note Rm is not directly attached to the subnets of C or S.

 

(a) What information can the malicious user learn about who C and S are? Consider both computer addresses and information that may identify the human user (e.g. names, locations), and explain how the malicious user may obtain that information. [2 marks]

 

(b) If Network Address Translation (NAT) is used in the subnet for C (but not for S), how does that change your answer to sub-question (a)? [1 mark]

 

One method for providing privacy in the Internet is using a Virtual Private Network (VPN). Assume client C is using a VPN server which is located on a router in the path between C and S (but not on Rm).

 

(c) What information can the malicious user learn about who is communicating when C

and S communicate via the VPN server? [1 mark]

 

(d) Potential disadvantages of using a VPN server include: reduced performance between C and S; required to trust the VPN server; and VPN server logs may be requested/accessed (by the malicious  user).  Explain  each  of these three  potential disadvantages. [3 marks]

 

Onion routing, used in Tor, is another method for providing privacy in the Internet. It is generally consider to provide more privacy than using a VPN. The following sub-questions require you to learn the basics of Tor.

 

(e) Explain how Tor (or onion routing) works. Use the scenario of C and S as an example.

That is, how would C communicate with S if Tor was used instead of a VPN. [2 marks] (f)  What are the advantages of Tor compared to VPN? [1 mark]

(g) What are the disadvantages of Tor computer to VPN? [1 mark]

 

 

100% Plagiarism Free & Custom Written, Tailored to your instructions