Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

HomeWork-Network Security using TCP

Posted on 2011-03-20
4
Medium Priority
?
483 Views
Last Modified: 2012-05-11
Hello:

I am interested in learning which protocol is best either TCP, UDP, or Tunneling (Proxy). Please see assignment question below.

Question:
Suppose there are two separate domains, one at SECRET (S) and one at Top Secret (TS), with a guard between them. Assume the guard is truly a “diode”, allowing packets in only one direction. What direction will the guard allow traffic to flow? Suppose you want to move traffic in the allowed direction. Can you run an ordinary TCP connection through the guard to pass it through the guard? Explain why/why not, and if not, what protocol can you use to move the data?
0
Comment
Question by:Sundayy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 31

Accepted Solution

by:
Justin Owens earned 2000 total points
ID: 35182788
It would have to be one way.  Remember that each level of classification builds on other levels.  If you have Top Secret clearance, it assumes Secret clearance.  Because of this, a Secret domain will be allowed to pass information UP to a Top Secret domain, but not from Top Secret DOWN to Secret.

Because UPD is the only protocol listed which doesn't require two way traffic, it defaults to the type of traffic which must be utilized through the guard.  Ordinary TCP never works only one way.

DrUltima
0
 

Author Closing Comment

by:Sundayy
ID: 35186745
Thanks for the clarification.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction This article explores the design of a cache system that can improve the performance of a web site or web application.  The assumption is that the web site has many more “read” operations than “write” operations (this is commonly the ca…
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question