We write, we don’t plagiarise! Every answer is different no matter how many orders we get for the same assignment. Your answer will be 100% plagiarism-free, custom written, unique and different from every other student.
I agree to receive phone calls from you at night in case of emergency
Please share your assignment brief and supporting material (if any) via email here at: email@example.com after completing this order process.
No Plagiarism Guarantee - 100% Custom Written
In this paper, you are required to understand the advantages and disadvantages of internet privacy technologies to present a clear report. Moreover, you are asked to answer all the question related to C and S and other question asked appropriately and clearly.
Question 5. Internet Privacy [11 marks]
Encryption is commonly used to provide data confidentiality in the Internet: when two hosts communicate, other entities in the path between the two hosts cannot read the data being sent. However encryption on its own does not privacy of who is communicating. Although the other entities cannot read the data, they can determine which two hosts are communicating.
Consider a simple view of an Internet path where client C is communicating using IPv4 with server S. There are n routers on the
Words: 438 path. Assume a malicious user, who wants to know information about who is communicating and when, has access to one of the routers in the path (router Rm), e.g. they can capture packets on that router. Note Rm is not directly attached to the subnets of C or S.
(a) What information can the malicious user learn about who C and S are? Consider both computer addresses and information that may identify the human user (e.g. names, locations), and explain how the malicious user may obtain that information. [2 marks]
(b) If Network Address Translation (NAT) is used in the subnet for C (but not for S), how does that change your answer to sub-question (a)? [1 mark]
One method for providing privacy in the Internet is using a Virtual Private Network (VPN). Assume client C is using a VPN server which is located on a router in the path between C and S (but not on Rm).
(c) What information can the malicious user learn about who is communicating when C
and S communicate via the VPN server? [1 mark]
(d) Potential disadvantages of using a VPN server include: reduced performance between C and S; required to trust the VPN server; and VPN server logs may be requested/accessed (by the malicious user). Explain each of these three potential disadvantages. [3 marks]
Onion routing, used in Tor, is another method for providing privacy in the Internet. It is generally consider to provide more privacy than using a VPN. The following sub-questions require you to learn the basics of Tor.
(e) Explain how Tor (or onion routing) works. Use the scenario of C and S as an example.
That is, how would C communicate with S if Tor was used instead of a VPN. [2 marks] (f) What are the advantages of Tor compared to VPN? [1 mark]
(g) What are the disadvantages of Tor computer to VPN? [1 mark]