Organization managing public information on its web server

Assignment Help Computer Network Security
Reference no: EM13762236

Question 1:

(a) Comment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.

(i) An organization managing public information on its Web server.

(ii) A law-enforcement organization managing extremely sensitive investigative

(iii) A financial organization managing routine administrative information (not privacy-related information).

(b) Explain, with examples, what active attacks are and how one would counter such attacks.

Question 2:

(a) (i) Apply stream ciphering encryption technique and describe how it can be used to provide confidentiality of messages. Illustrate your answer with an example.

(ii) RC4 algorithm is a common example of stream ciphering. Briefly explain the possible strength and weakness of this algorithm.

(b) (i) Consider the following message packet;

    Actual Data    Timestamp      Sequence Number

Suppose there is a secret key algorithm and Alice and Bob share a secret key for this algorithm. Message authentication is achieved using hash function. Discuss a possible problem scenario, given that an adversary Charles gets hold of the message and the hash function is not strong?

(ii) Apply Caesar's substitution cipher and determine the ciphertext for the message "cybersecurity", if the key is equal to 6.

Question 3:

(a) Demonstrate the TWO common approaches to providing message authentication without encryption. Illustrate your answer with the aid of appropriate diagrams.

(b) Apply public-key system (PKS) technique to describe how message authentication can be achieved. Illustrate your answer with the aid of a diagram.

Question 4:

(a) You have just been joined a company as their network administrator. As the network infrastructure is undergoing changes, you are asked to look into the possibility of implementing an intrusion detection system (IDS). Based on your initial observation, you found out that there were shortages of IT personnel as many of them have either left or retired. You got hold of some preVious information relating to the staff's profiles and system usage statistics. Management has no issue on approving the budget for the implementation of an IDS system.

(i) Based on the information given, will you be able to recommend which approach of intrusion detection system to implement or would more studies still need to be conducted. Justify your answer.

(ii) Whichever IDS approach recommended, are there any intrusions that are difficult to detect? Illustrate your answer with an example.

(b) Apply using packet filtering firewall and explain how this type of firewall can be used to provide security protection to an organization. Illustrate your answer with appropriate example.

Reference no: EM13762236

Questions Cloud

How does technology affect the productivity : How does technology affect the productivity and cost of the industry you currently work for or you are familiar with? How do the technical and economically efficient concepts shape the long-run average total-cost curve of this industry?
Logical expression : write a short paper on what your program does. Include the logical expression and what type of while loop (EOF, sentinel-controlled, counter-controlled, flag-controlled) you need. Using the same logical expression as above, use a different while l..
What do you believe is solution to social security crisis : What do you believe is the solution to the Social Security crisis? Why do you think reforms have not been implemented despite the consensus that the program is unstable?
Compresses a horizontal massless spring : A block of mass 2 kg is kept at rest as it compresses a horizontal massless spring (k = 120 N/m) by 8.52 cm. As the block is released, it travels 0.611 m on a rough horizontal surface before stopping. The acceleration of gravity is 9.8 m/s2 . Calcula..
Organization managing public information on its web server : omment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. An organization managing public information on its Web serv..
Dilutive eps of wonderful incorporation : If Wonderful has 29,000 shares of common stock outstanding throughout the year and its Net Income is $12,000 after paying the preferred dividends, what will be the dilutive EPS of Wonderful incorporation under treasury stock method? Round your ans..
An object of mass m is lowered at constant velocity : An object of mass m is lowered at constant velocity at the end of a string of negligible mass. As it is lowered a vertical distance h, its gravitational potential energy changes by?Ug = -mg hHowever, its kinetic energy remains constant, so that if we..
Recognize compensation expense on books : The service period is for 3 years, beginning January 1, 2010. As a result of the option granted to Wine, using the fair value method, Ellison should recognize compensation expense on its books in the amount of
Developing ipv6 : What is the primary reason for developing IPv6

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the major steps needed to preserve the integrity

Analyze the overall procedures for First Responder and Incident Handling, and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.

  Analysis to be presented in a 10- to 15-slide microsoft

analysis to be presented in a 10- to 15-slide microsoft powerpoint presentation and use detailed speaker notes for

  Role of ethics in developing the certification package

Description of the role of ethics in developing the certification package and Description of how to represent the required documentation and requirements in the certification package

  Describe the environment of your forensic workstation

Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory.

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

  Why do you think functional silos are not appropriate for

1. where are erp systems heading in the future? do you agree or disagree with the trends discussed in the chapter?

  Find the sequence obtained by applying successively the

1 encrypt the message buy now using the knapsack cipher based on the sequence obtained from the super-increasing

  Assess the levels of responsibility between government

write a three to fivenbsp page paper in which youdescribe the impact and the vulnerability of the scada stuxnet worm

  Describe the security implications of using these technology

Describe the security implications of using these technologies and how risk will be mitigated from a network hardware and software perspective.

  Security by obscurity

Defacement, Infiltration, Phishing, Pharming, Insider Threats, Click Fraud, Denial of Service, Data Theft/Loss, IP Whitelisting and IP Spoofing, recursive PHP functio, worm and a virus, hash on a string using MD5

  Discuss any threats to priva

Companies would share. sign-on Information for any Weh user Mb 0 agree to participate. They would also share personal Information such as call card dela, billing addresses, and personal preferences.

  Privacy and security of information

Privacy and security of information- Pat, a billing associate at a local hospital, was issued a laptop for work purposes. Her friend, however, has asked to borrow it for school to complete an online assignment

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd