List and explain key objectives of information security

Assignment Help Computer Network Security
Reference no: EM131188767 , Length: word count:1000

COIT12202 -Network Security Concepts Assignment

Short-answer questions

Question 1: Information security is used to describe the tasks of protecting information in a digital form.

(1) List and explain three key objectives of information security.

(2) Also list and explain at least two additional protections (concepts)to present a complete view of information security.

Question 2: ARP (Address Resolution Protocol) Poisoning is a form of attack in which an attacker sends falsified ARP messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.

(1) Use an example to illustrate (diagrams or written explanation) the ARP Poising attack process and

(2) Explain at least two strategies to prevent such kind of ARP spoofing.

Question 3: Integrity protection is used to guard against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

(1) Explain the kinds of technologies (algorithms) that can be used to guarantee data integrity.

(2) Provide two examplesof data integrity and

(3) Explain how DLP (Data loss prevention) can be used to prevent data leakage.

Question 4: The earliest and the simplest use of a substitution cipher was by Julius Caesar.

1804_Figure.png

Assume that Alice received the following message "skkzskglzkxznkzumgvgxze" from Bob, who used Caesar Cipher to let Alice know "meet me after the toga party".

Please complete the following tasks:

(1) Explain the cryptographic algorithm of Caesar Cipher.

(2) Explain what the plaintext is, what the ciphertext is and what the possible key value is.

(3) Explain an approach that can be used to attack Caesar Cipher. Is it possible to improve the cryptographic algorithm?

Question 5: RSA is an algorithm to encrypt and decrypt messages. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described RSA in 1978. A user of RSA creates and then publishes the product of two large prime numbers along with an auxiliary value as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. However, with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.

Answer the following questions:

(1) Explain whatcategory of cryptographic algorithms RSA belongs to.

(2) Explain how RSA is used to achieve thecryptography (encryption and decryption) and digital signatures.

(3) Explain the main weakness of digital signatures and how this weakness can be compensated for.

Reference no: EM131188767

Questions Cloud

Consistent with the business cycle theory : a) Unemployment is strongly countercyclical. Is this stylized fact of the business cycle fact consistent with the Business Cycle theory?
Determine the net work output, in kw h per year : A power cycle receives energy by heat transfer from the combustion of fuel and develops power at a net rate of 150 MW. The thermal efficiency of the cycle is 40%.
Which quality process improvement tools would bring benefit : Now that you have defined the quality dimensions, you will need to determine which quality process improvement tools and techniques would bring the biggest benefit to your project.
Means of encouraging improvements in human rights : More than 500 U.S. firms have developed offices or factories in China. Many other U.S. firms have become exporters to China in recent years. However, the U.S. government has periodically threatened to restrict business between the United States and C..
List and explain key objectives of information security : Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..
Analyze planned actions in soliciting and awarding contracts : Analyze the planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency in question is in compliance with the FAR requirements.
Compute the total cost of inventory : Joe's Bar (not its real name) uses 800 kegs of adult beverages per year on a continuous basis (assume 365 days of operations per year). Determine the reorder point d. Compute the Total Cost of Inventory.
How would you carry out the analysis : Under pressure by regulators and consumers, the company is considering lowering the price of the medicine by 10 percent. The company has hired you to analyze the effect of such a cut on its profits. How would you carry out the analysis? What infor..
Define incremental cash flow : Define incremental cash flow and Should you subtract interest expense or dividends when calculating project cash flow - Calculate the annual sales revenues and costs (other than depreciation). Why is it important to include inflation when estimating..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What steps would you advise to prevent such attacks

What steps would you advise to prevent such attacks? What limitations does this form of attack have - explain why the flag has been set and what it means for TCP connection.

  How to protect a computer and business against their threat

Security goes hand-in-hand with developing effective Excel applications. As an Excel user, it is necessary to learn more about macro viruses and how to protect a computer and business against their threat

  Discuss the affect the amendments have on evidence discovery

discuss the importance of evidence contamination prevention, authenticity, and presentation in court

  Identify hardware and software needed to secure your network

Identify hardware and software needed to secure your choice of networks against all electronic threats. Compare Local Area Networks (LANs), Wide Area Networks (WANs), and wireless technologies.

  What information items are included in this ticket

When the Server receives the authenticator and the ticket from the client. The server will compare the information items contained in the authenticator and the ticket to authenticate the client user's identity. Please give a detailed answer on how..

  How to demonstrate that the server is up and running

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve daemon that is supplied with SVN (please note that this is not the most secure way to access an SVN repository)

  Identify different categories of network security attacks

Identify different categories of network security attacks in LAN and WAN environments - apply specific security solutions for different types of attacks

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

  Define the concepts of symmetric key encryption

Define the concepts of symmetric key encryption, public key encryption, and hashing and explain which of these techniques are used for confidentiality and authentication.

  Explain how the selected computer crime victimizes someone

Explain how the selected computer crime victimizes someone. Evaluate how vulnerable or susceptible society is today, with respect to this computer crime.

  Reliable transmission of large volume data

Modern network applications require reliable transmission of large volume of data with bounded delay, between users and data-centres and between data-centres, potentially half way around the earth. What are the limitations in using distributed data c..

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd