1,415
8
Essay, 2 pages (300 words)

Example of essay on covert channels

Part A

Error message in the ICMP protocol is a truly a good example of a storage channel. As the writer argued, it is the information about the operating system, contained in the echoing message, which can be exploited by the hackers. The most prevalent attack that face is identity theft and password cracking. The typical purpose of error message is to send a report of any error that occurs during datagram processing by providing feedback on any problem within the communication environment. However, the error message does not make the IP reliable. The error message is not effective because it does not guarantee the delivery of datagram or return of control message. In some cases, the datagram is not delivered and there is no nitification. The writer’s mitigation mechanism of entering a set of zero’s in the fields that are reserved and eliminating critical information is the best for this situation.

Reference

Frankel et al, S. (Dec 2005). Guide to IPsec VPNs. NIST Special Publication 800-77 .
Harrington, J. (2009). Network Security: A Practical Approach. Academic Press.

Part B

As the writer argued, timing channel is a type of covert channel which depends on time. However, the example that the writer gave does not indicate an ideal example for a timing covert channel. An ideal example is a case of a military base with two individuals operating at different levels of security. Since the only medium of communication is a single computer that is separate, the computer which transmits the signal can simply request the data to be sent from the other computers. It processes it and move to the next computer. Since they transmit binary signals continuously, the hackers can monitor and get the signal using time. When the computer sends the signal instantly, then the other computer operating at higher security can realize. The writer’s recommendation of changing the algorithm and using the same CPU to confuse the hacker is suitable.

References

Bernard, L. (2010). Network and System Administration. NeXT Computer, Incorporated.
Perlman, R. (2000). Key Exchange in IPSec: Analysis of IKE, IEEE Internet Computing. Cengage.

Thank's for Your Vote!
Example of essay on covert channels. Page 1
Example of essay on covert channels. Page 2
Example of essay on covert channels. Page 3

This work, titled "Example of essay on covert channels" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Example of essay on covert channels'. 14 September.

Reference

AssignBuster. (2022, September 14). Example of essay on covert channels. Retrieved from https://assignbuster.com/example-of-essay-on-covert-channels/

References

AssignBuster. 2022. "Example of essay on covert channels." September 14, 2022. https://assignbuster.com/example-of-essay-on-covert-channels/.

1. AssignBuster. "Example of essay on covert channels." September 14, 2022. https://assignbuster.com/example-of-essay-on-covert-channels/.


Bibliography


AssignBuster. "Example of essay on covert channels." September 14, 2022. https://assignbuster.com/example-of-essay-on-covert-channels/.

Work Cited

"Example of essay on covert channels." AssignBuster, 14 Sept. 2022, assignbuster.com/example-of-essay-on-covert-channels/.

Get in Touch

Please, let us know if you have any ideas on improving Example of essay on covert channels, or our service. We will be happy to hear what you think: [email protected]