Sei sulla pagina 1di 6

UNIVERSIDAD NACIONAL AUTÓNOMA DE MÉXICO

FACULTAD DE ESTUDIOS SUPERIORES ARAGÓN

SEGURIDAD INFORMÁTICA
Ingeniería en Computación

Grupo: 2707

Tarea X

ALUMNO:
Chávez Onofre Gonzalo

PROFESOR:
Ing. Erik de Jesús Neria Orozco

Nezahualcóyotl, Estado de México a Mayo de 2019


SEGURIDAD INFORMÁTICA

Baseband

The baseband and broadband are the types of signalling techniques. These terminologies
were developed to categorise different types of signals depending on particular kind of signal
formats or modulation technique.

The prior difference between baseband transmission and broadband transmission is that in
the baseband transmission the whole bandwidth of the cable is utilized by a single signal.
Conversely, in the broadband transmission, multiple signals are sent on multiple frequencies
simultaneously using a single channel.

Comparison Chart

BASIS FOR
BASEBAND TRANSMISSION BROADBAND TRANSMISSION
COMPARISON

Type of signalling Digital Analog


used

Application Work well with bus topology. Used with a bus as well as tree
topology.

Encoding Used Manchester and Differential PSK encoding.


Manchester encoding.

Transmission Bidirectional Unidirectional

Signal range Signals can be travelled over Signals can be travelled over long
short distances distances without being attenuated.

CHÁVEZ ONOFRE GONZALO, GRUPO 2707, UNAM FES ARAGÓN 2


SEGURIDAD INFORMÁTICA

Definition of Baseband Transmission

Baseband transmission uses whole frequency spectrum of the medium for the
transmission. That is the reason frequency division multiplexing cannot be used in the
transmission but time division multiplexing is used in this transmission as in TDM the link is
not divided into multiple channels instead it provides each input signal with a time slot, in
which the signal utilize whole bandwidth for a given time slot. The signals are carried by
wires in the form of electrical pulse.
Signals transmitted at point propagated in both the directions hence it is bidirectional. The
expansion of baseband signal is limited to shorter distances because at high frequency the
attenuation of the signal is most strong and the pulse blur out, causing the large distance
communication completely impractical.

Definition of Broadband Transmission

The Broadband transmission employs analog signals which include optical or


electromagnetic wave form of signal. The signals are sent into multiple frequencies
permitting multiple signals to be sent simultaneously. Frequency division multiplexing is
possible in which the frequency spectrum is divided into multiple sections of bandwidth. The
distinct channels can support different types of signals of varying frequency ranges to travel
simultaneously (at the same instance).
The signals propagated at any point are unidirectional in nature, in simple words the signal
can be travelled at only one direction, unlike baseband transmission. It requires two data
path that are connected at a point in the network refer to as headend. The first path is used
for signal transmission from the station to the headend. And the other path is used for
receiving propagated signals.

Key Differences Between Baseband and Broadband Transmission

1. Baseband transmission utilizes digital signalling while broadband transmission uses


analog signalling.
2. Bus and tree topologies, both work well with the broadband transmission. On the
other hand, for the baseband transmission bus topology is suitable.
3. Baseband involves manchester and differential manchester encoding. In contrast,
broadband does not make use of any digital encoding instead it uses PSK (Phase
shift keying) encoding.
4. The signals can be travelled in both the direction in baseband transmission whereas
in broadband transmission the signals can travel in only one direction.
5. In baseband transmission, the signals cover shorter distances because at higher
frequencies the attenuation is most pronounced which make a signal to travel short
distances without reducing its power. As against, in broadband signals, the signals
can be travelled at longer distances.

CHÁVEZ ONOFRE GONZALO, GRUPO 2707, UNAM FES ARAGÓN 3


SEGURIDAD INFORMÁTICA

OSI Model

OSI Model (Open Systems Interconnection) is a standardised Reference Framework for


conceptualising data communications between networks.

CHÁVEZ ONOFRE GONZALO, GRUPO 2707, UNAM FES ARAGÓN 4


SEGURIDAD INFORMÁTICA

Wireshark is a network packet analyzer. A network packet analyzer will try to capture
network packets and tries to display that packet data as detailed as possible.
You could think of a network packet analyzer as a measuring device for examining what’s
happening inside a network cable, just like an electrician uses a voltmeter for examining
what’s happening inside an electric cable (but at a higher level, of course).
In the past, such tools were either very expensive, proprietary, or both. However, with the
advent of Wireshark, that has changed. Wireshark is available for free, is open source, and
is one of the best packet analyzers available today.

CHÁVEZ ONOFRE GONZALO, GRUPO 2707, UNAM FES ARAGÓN 5


SEGURIDAD INFORMÁTICA

Protecting Private Keys

Code signing best practices for generating and storing private keys in a secure manner.
DigiCert recommends that developers take precautions with the code signing process and
the private key associated with their signing certificate.
Recommendations:
• Limit access to keys
Maintain access controls to and accounting of code signing keys and limit their distribution.
This will help enforce strict accountability for key use.
• Physically secure the key storage device in a locked container
o Ensure key storage devices are not left on desks, in unlocked drawers, or
where they can be easily taken or copied.
o Keep the device storing the private key in a locked desk drawer or cabinet or
otherwise behind locked doors.
• Use a strong password for private key
Choose a strong password for the private key. We require having at least sixteen (16)
characters that are randomly generated containing uppercase letters, lowercase letters,
numbers, and symbols to transport private keys. Words in a dictionary, derivatives of user-
IDs, common character sequences (e.g., "123456"), proper names, geographical locations,
common acronyms, slang, family member names, birthdays, etc. are not to be used.
• Secure storage for private key
Securely store a private key using a FIPS 140-2 Level 2 certified cryptographic device.
Export of the private key is not allowed by these cryptographic devices. Most of these
devices include multi-factor authentication.
• Test Signing certificate vs Release Signing certificate
Microsoft recommends using a separate Test signing certificate to sign prerelease code.
The Test signing certificate should only be trusted in the test environment. Test signing
certificates can be a self-signed certificate or come from an internal test CA.

CHÁVEZ ONOFRE GONZALO, GRUPO 2707, UNAM FES ARAGÓN 6

Potrebbero piacerti anche