Briefly describe the technologies

Assignment Help Computer Network Security
Reference no: EM132199676

Assignment Scenario

A major cloud computing company has asked you to assess two similar technologies, from a big-picture view (without too much technical detail), to help them decide which alteranative they should use.

The general idea is for your report to:

1. Briefly describe the two technologies.

2. Compare and contrast the two technologies: what are their good points and (more interestingly) their bad points or weaknesses.

3. Finally, what is your personal recommendation of which should a data-oriented company use? Explain why, perhaps by comparing their good points and bad points. If all options seem bad, feel free to recommend "none of the above".

Any two similar technologies would be fine, below are some possible topics:

A Few Possible Topics

1. To stop spam email,should we use:
- a Bayesian spam filter on the email server, or instead
- email address authentication?

2. VPN encryption: should we use:
- IPSec or
- TLS/SSL or
- One of the less popular protocols such as Cisco's AnyConnect (which uses Datagram Transport Layer Security (DTLS)) or Microsoft Point-to-Point Encryption (MPPE)?

3. What is the difference (if any) between the:
- Deep web (which usually means any web sites not indexed by search engines).
- Dark web (which usually means web sites doing criminal stuff).
Is one a subset of the other, or are they different but overlapping, or what?

4. Encryption key management: should we use
- A certificate authority for an SSL/TLS key and certificate (like a web site uses), or
- Our own key server for our company, something like Kerberos protocol.

5. How to send large binary files to a colleague, in a secure way? Should I use:
- Email attachments in MIME (given that email is not perfectly secure), or
- One-click hosting (also called a cyberlocker), such as www.mega.nzor similar?

6. On the subject of cyberlocker web sites, which one do you think is best? Take into account reviews of speed, is end-to-end encryption available, is it free, does the U.S. government read your files, and so on. Remember that our data company would value security above all else, so CALEA becomes very relevant, and end-to-end encryption would also be very nice.

7. My company spies on other people. Which do you recommend a spy to use:
- A hardware keylogger, perhaps with WiFi to you never have to get it back, or
- Some malware that tries to read the victim's hard drive.

8. Undeniable signatures are where someone cannot deny that they sent a message. There are several ways to do this, so describe two ways, and recommend what you think seems the best.

9. Encrypted, blockchain-based cryptocurrencies are popular today. What is the difference (if any) between:
- Bitcoin, and
- Etherium (or any other cryptocurrency that isn't Bitcoin, such as Zcash).
If all cryptocurrencies seem bad to you, feel free to recommend not to use any.

10. In the United States, they have a law called the Communications Assistance for Law Enforcement Act (CALEA). It requires companies that have computer networks (including Skype, Hotmail, Gmail, and all U.S. universities) to allow the U.S. Government to easily tap in to the private data of customers for real-time surveillance. This includes your emails, your Skype conversations, and so forth.

To prevent the U.S. Government from listening to your communications, should we use:
- Open-source substitutes for Skype with strong encryption, such as LinPhone, Tox, SureSpot, ChatSecure, or RedPhone, or instead:
- Some other commercial alternative, such as WeChat.

11. Cryptographic hash functions are a basic technology used in many encryption methods. Some hash functions are:
- Older but popular ones like MD5 and SHA-1
- Newer ones that are supposed to be better, like BLAKE2, SHA-3, and Tiger.
Is newer really better? Or are the older generation still okay

Verified Expert

" This is a report on the topic, "To stop spam email, should we use: a Bayesian spam filter on the email server, or instead email address authentication? The report contains information about two of the technologies, the problems related to spam and how the technologies can be used to stop spam.Based on the comparative discussion presented on the report, there is a recommendation section to understand how to use two of the technologies in the given scenario to stop spam."

Reference no: EM132199676

Questions Cloud

How will your communication strategies change for each group : Describe one internal and one external method for the dissemination of your EBP project results. For example, an internal method may be the hospital board.
Conduct a deep dive research session into subject company : Research is based upon the ability to focus on the appropriate problem and adequately defining it, not what is necessarily the surface issue.
Discuss the process of debt accumulation : Loans and Debt. Discuss the process of debt accumulation in poor countries, ie, how loans are granted, fall behind in payment, and eventually
What is the market price of the bond : There is an 8%, 25 year bond which was issued 5 years ago. If the market rates of interest are 2%, what is the market price of the bond
Briefly describe the technologies : Research Report - Compare and contrast the two technologies: what are their good points and (more interestingly) their bad points or weaknesses
Derive the marginal revenue curve for the firm : The David Company's demand curve for the company's product is P = 2,000 - 20Q, where P = price and Q = the number sold per month.
Land available to raise apples and beets : A farmer has 150 acres of land available to raise apples and beets.
Price elasticity of demand : The demand curve is Qd = 200 - ¼ P. Calculate the (point) price elasticity of demand when price is $24. Is demand elastic or inelastic?
Determine the effectiveness of your change : In order to evaluate an evidence-based practice project, it is important to be able to determine the effectiveness of your change.

Reviews

len2199676

12/20/2018 10:02:46 PM

Note: This is not a group project. Each student must individually complete all parts of their submission. Students must start with a new document and they must not have another person’s file in their possession at any time. Students are welcome to discuss the task with each other (and with the lecturer), but each student must write their assignment independently and not show their work to other students.

Write a Review

Computer Network Security Questions & Answers

  Describe the purpose of a ddos attack

Describe the purpose of a DDoS attack. How is a DDoS attack configured. How can DDoS attacks be detected and prevented. Research the internet for a DDoS attack. Describe the events.

  Recovering scrambled bits

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  How http and smtp figure into organizational security

Users are familiar with some network services like HTTP (Hypertext Transport Protocol) - the Web; and SMTP. Tell us more about these services. How do they figure into organizational security? Elaborate with specifics.

  Modify your finger server program to use threads

Modify your finger server program to use threads. The server should activate a new thread to process each incoming client request, thus allowing client requests to be processed concurrently.

  Encryption requirements as stated in the law

Identify ONE law, either a US Federal Law or a US state law, that requires the use of encryption to protect either consumer or corporate information from unauthorized disclosure. Write a 150+ word plain English summary in which you address the fol..

  Investigate the development on massive mimo technology

Investigate the development on massive MIMO technology and prepare a brief report of around 1400 words. Your references may come from websites, white papers, government documents or published conference or journal papers.

  What challenges does a security professional face

Security Principles What challenges does a security professional face? What is the difference between integrity and non-repudiation?

  Why is it attractive to a laptop user to have wlan access

Why is it attractive to a laptop user to have WLAN access? Why is it attractive for a laptop user to have cellular data access? Why is it good for carriers?

  What is the definition of information security what

1.what is the definition of information security? what essential protections must be in place to protect information

  Network topology design for abc

Network topology diagram and the domains of trust and security-related assumptions in your design and security policy to make this assumption valid.

  Explain the general intent of a trojan horse

Explain the general intent of a Trojan horse.

  Describe the life cycle of an information system

Suppose that you run a photography printing store. Your workers have been using punch cards for time entry since you started the business.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd