Is security really all that important to you

Assignment Help Computer Network Security
Reference no: EM131001056

Objectives:

- Write a reflection
- Hash files to verify their authenticity
- Use the cloud-based Dropbox to share content

- Learn how to create an encrypted disk image (Mac) or an encrypted VHD (PC)

Note: We will be discussing many of the assignment details in class.

Tasks:

1. REFLECTION: Spend some time thinking about how you view computing security in a connected world. Is security really all that important to you? Do you feel vulnerable? Do you feel like you are doing enough to protect yourself? Are you thinking about ways of enhancing your security?

Is there too much hype with respect to various breaches in security? Do you have anything to hide? What are your thoughts? Write a 350 - 400 word reflection.

- Please name your file as follows: LastName_FirstName_Reflection2.

- Reflections are personal introspections. There are no right or wrong answers.

- There is nothing wrong with doing a little reading before writing a reflection if you choose to do so. Just keep in mind that the reflection ultimately consists of your perspective.

-Take the reflection where ever you please.

- The reflection is informal, but reasonable spelling and grammar is appreciated.

- doc, docx, or PDF format only. Please ensure your name, student number, course number, and assignment number are in the header.

2. Examine the nine text files located in the folder found at:

https://www.dropbox.com/sh/ymp4t54s73hisiw/AAD7yXVqmFLfuKGiOgmXPHVqa?dl=0

At least one of them contains an "original" document representing the novel "A Christmas Carol" by Charles Dickens. Your task is to find out which of these nine very similar documents are original. It is known that the SHA-256 hash of the "original" document is:

HEX: F0968458E7E0823103872A503A350D90E607DE71E2B2BF486E884C746CDF3EEE

Which of these nine documents is an "original"? List out the SHA-256 hashes of each of the documents. Create a PDF document that contains your answer.

3. Upload your PDF document from (2) to a Dropbox account.

- If you do not have a Dropbox account, create one.

- Upload the PDF document; it doesn't matter where.

- Capture a link to this document and paste it into the comments box in of your assignment submission. Label this link "Question 3".

4. i. Create an event that takes place at a particular time on a particular date in March 2016.

ii. Create an event that takes place all day on a particular date in March 2016.

iii. Create an event that takes place and repeats once a week for all the weeks in March 2016.

iv. Create an event that takes place for five consecutive days (Monday through Friday) in March 2015.

Ensure your Google Form and Google Calendar are publically accessible and paste the URL for each into the comments box of your assignment submission. Label these links "Question 4".

5. As D2L Dropbox requires the submission of at least one file, submit your PDF from (2)

Reference no: EM131001056

Questions Cloud

Determine the rejection region for a hypothesis test : (i) state the appropriate null and alternative hypotheses; (ii) determine the appropriate test statistic; (iii) determine the rejection region for a hypothesis test at the α = 0.05 signi?cance level; (iv) determine the associated p-value. (v) Wh..
How does this actor impact the story of conflict : What are its strengths, limitations, etc? How does this actor impact the story of conflict? In addition to the short assessment (250 words), provide three quotes from the text including page numbers
Prepare the journal entries to record these transactions : Purchases of merchandise on account during the year totaled $845,000. Merchandise costing $902,000 was sold on account for $1,420,000. Prepare the journal entries to record these transactions.
Do you agree that desire has mechanical nature of machine : Do you agree with this model of machines, or do you think that there are processes in the human body, mind or in nature in general that do not fit this framework? Do you agree that desire has the mechanical nature of a machine
Is security really all that important to you : Spend some time thinking about how you view computing security in a connected world. Is security really all that important to you? Do you feel vulnerable? Do you feel like you are doing enough to protect yourself? Are you thinking about ways of en..
Write about youth drug addiction causes and concerns : Write about Youth drug addiction causes and concerns related to sociology
Why are multiple role relationships potentially problematic : Why are multiple role relationships potentially problematic? How can multiple role relationships be either avoided or handled professionally
Using labor market graph with appropriately labelled x-axis : Suppose that in the United States corn production uses land and labor, while beer production uses capital and labor. Labor is mobile between the corn and beer industries, while land is specific to the corn industry and capital is specific to the beer..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Case study on network infrastructure

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities.

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  New product development and product enhancement teams

As the new technical communications manager for International Gadgets (IG), you have developed a good idea of the various internal and external audiences for communications across the enterprise.

  Encryption requirements as stated in the law

Identify ONE law, either a US Federal Law or a US state law, that requires the use of encryption to protect either consumer or corporate information from unauthorized disclosure. Write a 150+ word plain English summary in which you address the fol..

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Windows os vulnerability analysis using metapsloit framework

Windows OS Vulnerability Analysis Using the Metapsloit Framework - Penetration testers use the Metasploit Framework to find security weaknesses in operating systems, applications and networks.

  Describe the data synchronization

Describe the Data synchronization in one page.

  How to encrypt a message using a stream cipher

How to encrypt a message using block cipher algorithms we covered in class? What are the similarities and differences between those algorithms and How to encrypt a message using a stream cipher?

  Evaluate quality of security offered by micropayment system

Briefly describe how it works. Evaluate the quality of security offered by this micropayment system and evaluate one such micropayment system.

  Strategy for dealing with the risk

For each malicious attack and threat identified, choose a strategy for dealing with the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance)

  Analyze specific potential malicious attacks

Analyze specific potential malicious attacks and / or threats that could be carried out against the network and organization and explain in detail the potential impact of the three selected malicious attacks

  What is a firewall

What is a firewall. How does a VLAN and firewall combination assist you in achieving the desired goal

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd