Solved

HomeWork-Network Security using TCP

Posted on 2011-03-20
4
466 Views
Last Modified: 2012-05-11
Hello:

I am interested in learning which protocol is best either TCP, UDP, or Tunneling (Proxy). Please see assignment question below.

Question:
Suppose there are two separate domains, one at SECRET (S) and one at Top Secret (TS), with a guard between them. Assume the guard is truly a “diode”, allowing packets in only one direction. What direction will the guard allow traffic to flow? Suppose you want to move traffic in the allowed direction. Can you run an ordinary TCP connection through the guard to pass it through the guard? Explain why/why not, and if not, what protocol can you use to move the data?
0
Comment
Question by:Sundayy
4 Comments
 
LVL 31

Accepted Solution

by:
Justin Owens earned 500 total points
ID: 35182788
It would have to be one way.  Remember that each level of classification builds on other levels.  If you have Top Secret clearance, it assumes Secret clearance.  Because of this, a Secret domain will be allowed to pass information UP to a Top Secret domain, but not from Top Secret DOWN to Secret.

Because UPD is the only protocol listed which doesn't require two way traffic, it defaults to the type of traffic which must be utilized through the guard.  Ordinary TCP never works only one way.

DrUltima
0
 

Author Closing Comment

by:Sundayy
ID: 35186745
Thanks for the clarification.
0

Featured Post

The New “Normal” in Modern Enterprise Operations

DevOps for the modern enterprise offers many benefits — increased agility, productivity, and more, but digital transformation isn’t easy, especially if you’re not addressing the right issues. Register for the webinar to dive into the “new normal” for enterprise modern ops.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DNS on-premise and on-cloud 15 128
Fortigate 100D NTP Issue 4 105
Which Switch is Switch - improving performance 9 71
Cisco WRVS4400N 11 37
Security is one of the biggest concerns when moving and migrating your data from your on-premise location to the Public Cloud.  Where is your data? Who can access it? Will it be safe from accidental deletion?  All of these questions and more are imp…
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question