Search for question
Question

In your responses to your peers, address the following: • If you were charged with designing a new network and introducing Open Shortest Path First (OSPF) instead of RIP, how would adopting OSPF affect the fundamental design principle your peer identified in their initial post? Consider addressing the effects on both security and network traffic in your reply. For your response posts, do the following: • Reply to at least two classmates outside of your own initial post thread. • Demonstrate more depth and thought than saying things like "I agree" or "You are wrong." Guidance is provided for you in the discussion prompt. Criteria Comprehension Timeliness Engagement Discussion Rubric Proficient Exemplary Develops an initial post with an organized, clear point of view or idea using rich and significant detail (100%) N/A Provides relevant and meaningful response posts Develops an initial post with a point of view or idea using adequate organization and detail (85%) Needs Improvement Develops an initial post with a point of view or idea but with some gaps in organization and detail (55%) Submits initial post on time Submits initial post one day (100%) late (55%) Provides relevant response posts with some Provides somewhat relevant response posts with some explanation and detail (55%) Not Evident Does not develop an initial post with an organized point of view or idea (0%) Submits initial post two or more days late (0%) Provides response posts that are generic with little Criteria Writing (Mechanics) Exemplary with clarifying explanation and detail (100%) Writes posts that are easily understood, clear, and concise using proper citation methods where applicable with no errors in citations (100%) Proficient explanation and detail (85%) Writes posts that are easily understood using proper citation methods where applicable with few errors in citations (85%) Needs Improvement | Writes posts that are understandable using proper citation methods where applicable with a number of errors in citations (55%) 1st Response Paul Beck, 6-1 Discussion: Routing Protocol Vulnerabilitie Paul Beck Not Evident explanation or detail (0%) Writes posts that others are not able to understand and does not use proper citation methods where applicable (0%) Proficiency is essential to maintaining an adversarial mindset. With proficiency comes the constant need to refocus ones efforts towards understanding the techniques of hackers. Only diligent study and constant awareness will aid in the anticipation of future attacks. The mention of implementing RIP should perk up the ears of any cybersecurity analyst, as the conversion would open some potential weak spots. RIP does not have the capability to implement any form of authentication, which makes following design principles like least privilege impossible. Threat actors often exploit this vulnerability by creating spoofed RIP packets to re-route packet destinations, thus allowing them to sniff passwords and other confidential information. DoS attacks are also a good Total example of a type of attack that may take place because of the lack of authentication. Because RIP broadcasts an entire routing table to its nearest neighbor every 30 seconds, there is no true way to following the minimization of implementation principle. References: What is Routing Information Protocol (RIP) and How Does It Work? (techtarget.com) Routing Information Protocol - an overview | ScienceDirect Topics https://learn.snhu.edu/d21/lor/viewer/viewFile.d2lfile/1483241/22533,-1/ 2nd Response Marcel Baldassarri Employing an adversarial mindset when considering the implementation of the Routing Information Protocol (RIP) necessitates a critical evaluation of security principles, notably the principle of "least privilege." This principle advocates for providing only the necessary access or capabilities needed for a specific purpose, no more, no less, to minimize potential attack surfaces. In the context of RIP, this principle highlights a vulnerability related to excessive trust. RIP, by design, trusts routing information updates from all sources without authentication, assuming that all participating routers are benign and trustworthy. This inherent trust exposes networks to risks such as routing table poisoning, where an attacker could introduce incorrect routing information, leading to traffic redirection or denial of service attacks. By adopting an adversarial mindset, one recognizes the necessity of implementing additional security measures, such as route authentication or the integration of more secure routing protocols that adhere to the least privilege principle by validating route information. While RIP may facilitate network communication, its vulnerability underscores the importance of cautious protocol selection and configuration in alignment with security principles to safeguard network integrity and confidentiality.