Analyse network traffic to identify potential vulnerabilitie

Assignment Help Other Subject
Reference no: EM132488367 , Length: word count:3000

CTEC5801 - Foundation of Cyber Security - De Montfort University

Combined Coursework

Learning Outcomes

Learning Outcome 1: Create a new or modify an existing C program in order to complete a given specification
Learning Outcome 2: Explain and demonstrate understanding of an operating system's persistent storage
Learning Outcome 3: Evaluate and justify the use of cryptographic tools and techniques in an application context
Learning Outcome 4: Critically analyse network traffic to identify potential vulnerabilities
Learning Outcome 5: Relate knowledge of topics to cyber security domain

Task 1. Write a C program to implement a Vigenère cipher. You may use whatever IDE you wish but the program must be compile with the standard gcc compiler. Your program should give the user the option to either encrypt or decrypt a message. The user should be prompted to enter the passphrase to be entered and the keyword to be used in the cipher. The output should be text printed to stdout. Comments should be used to explain the rationale behind the design of your code. You must also provide a critical analysis as to the robustness of the Vigenère cipher and provide a recommendation as to whether or not it would be it would be sufficient for use in communications between colleagues within a non-technical environment.

Task 2. In your role as an Information Security Specialist for Global Designs Limited, you have been tasked with creating a set of policies for secure data. The data stored by Global Designs Ltd has a useful lifetime of 1 year, after which it is deleted. This deletion is done simply using the delete functionality of the Operating System. You are required to determine if this is adequate to fully delete the data, if not provide potential ways to recover the data and recommendations for how the data could be securely destroyed. They have asked that the report contains an overview of how data is deleted and recovered at a level the non-technical staff can understand as well as a more technical explanation of the architectural differences between the two for the IT Department. You may include any images or other supporting material within a single appendix. The report should not exceed 1,500 words.

Task 3. In your role as a consultant for Data Storage Solutions, you have been tasked with providing a report into the current state of the art encrypted e-mail solutions. Identify if information can be extracted from e-mails if the network traffic has been intercepted. If it can, identify how the solutions you have assessed solve this problem. Different existing solutions should be considered, critically analysed and compared. Additionally, an overview of the current state of the art research in the field should be included. At the end of the report, clear guidelines should be included detailing when it would be most appropriate to use each solution covered in the main report.

Task 4. Download the pcap file CTEC5801_coursework.pcap and analyse the traffic. Identify, analyse and explain all connections and interactions you can identify. Assess whether or not any of the connections might be suspicious, identify these and explain why they might pose a danger. You must include:
- Start frame
- Mac address of host initiating the connection
- Mac address of destination host
- IP address of host initiating connection
- IP address of destination host
- The port used by the initialising host
- The port used by the destination host

Attachment:- Foundation of Cyber Security.rar

Reference no: EM132488367

Questions Cloud

Brief summary and analysis of the journal articles : Brief summary and analysis of the journal articles reviewed. The type of articles you will need to find is researcharticles located in scholarly journals.
Prepare the journal entries to record the restricted stock : Prepare the journal entry to account for this forfeiture. (Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Prepare the entry to record the issuance of the bonds : Prepare the entry to record the issuance of the bonds and warrants. (Credit account titles are automatically indented when amount is entered)
What accumulated depreciations represents : If you have a fixed asset on books that has a book value of $100,000 and accumulated depreciation of $500,00 how much the asset originally cost?
Analyse network traffic to identify potential vulnerabilitie : Evaluate and justify the use of cryptographic tools and techniques in an application context and Critically analyse network traffic to identify potential
Compute annual depreciation for the first and second years : Compute annual depreciation for the first and second years using the straight-line method. (Round answers to 0 decimal places, e.g. 125.)
What was campbell soup return on assets : Net sales of $7,586 million, and net income of $736 million. What was Campbell Soup's return on assets? (Round answer to 1 decimal places, e.g. 17.5%.)
Find the pv of the firms stock price at the end of year : Find the PV of the firm's stock price at the end of Year 3. Shell is experiencing rapid growth. Earnings and dividends are expected to grow
Build strong companies by listening and involving staff : Senior Leaders can build strong companies by listening and involving staff in their decision making which in return would make the change management process

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd