Briefly describe the technologies

Assignment Help Computer Network Security
Reference no: EM132199676

Assignment Scenario

A major cloud computing company has asked you to assess two similar technologies, from a big-picture view (without too much technical detail), to help them decide which alteranative they should use.

The general idea is for your report to:

1. Briefly describe the two technologies.

2. Compare and contrast the two technologies: what are their good points and (more interestingly) their bad points or weaknesses.

3. Finally, what is your personal recommendation of which should a data-oriented company use? Explain why, perhaps by comparing their good points and bad points. If all options seem bad, feel free to recommend "none of the above".

Any two similar technologies would be fine, below are some possible topics:

A Few Possible Topics

1. To stop spam email,should we use:
- a Bayesian spam filter on the email server, or instead
- email address authentication?

2. VPN encryption: should we use:
- IPSec or
- TLS/SSL or
- One of the less popular protocols such as Cisco's AnyConnect (which uses Datagram Transport Layer Security (DTLS)) or Microsoft Point-to-Point Encryption (MPPE)?

3. What is the difference (if any) between the:
- Deep web (which usually means any web sites not indexed by search engines).
- Dark web (which usually means web sites doing criminal stuff).
Is one a subset of the other, or are they different but overlapping, or what?

4. Encryption key management: should we use
- A certificate authority for an SSL/TLS key and certificate (like a web site uses), or
- Our own key server for our company, something like Kerberos protocol.

5. How to send large binary files to a colleague, in a secure way? Should I use:
- Email attachments in MIME (given that email is not perfectly secure), or
- One-click hosting (also called a cyberlocker), such as www.mega.nzor similar?

6. On the subject of cyberlocker web sites, which one do you think is best? Take into account reviews of speed, is end-to-end encryption available, is it free, does the U.S. government read your files, and so on. Remember that our data company would value security above all else, so CALEA becomes very relevant, and end-to-end encryption would also be very nice.

7. My company spies on other people. Which do you recommend a spy to use:
- A hardware keylogger, perhaps with WiFi to you never have to get it back, or
- Some malware that tries to read the victim's hard drive.

8. Undeniable signatures are where someone cannot deny that they sent a message. There are several ways to do this, so describe two ways, and recommend what you think seems the best.

9. Encrypted, blockchain-based cryptocurrencies are popular today. What is the difference (if any) between:
- Bitcoin, and
- Etherium (or any other cryptocurrency that isn't Bitcoin, such as Zcash).
If all cryptocurrencies seem bad to you, feel free to recommend not to use any.

10. In the United States, they have a law called the Communications Assistance for Law Enforcement Act (CALEA). It requires companies that have computer networks (including Skype, Hotmail, Gmail, and all U.S. universities) to allow the U.S. Government to easily tap in to the private data of customers for real-time surveillance. This includes your emails, your Skype conversations, and so forth.

To prevent the U.S. Government from listening to your communications, should we use:
- Open-source substitutes for Skype with strong encryption, such as LinPhone, Tox, SureSpot, ChatSecure, or RedPhone, or instead:
- Some other commercial alternative, such as WeChat.

11. Cryptographic hash functions are a basic technology used in many encryption methods. Some hash functions are:
- Older but popular ones like MD5 and SHA-1
- Newer ones that are supposed to be better, like BLAKE2, SHA-3, and Tiger.
Is newer really better? Or are the older generation still okay

Verified Expert

" This is a report on the topic, "To stop spam email, should we use: a Bayesian spam filter on the email server, or instead email address authentication? The report contains information about two of the technologies, the problems related to spam and how the technologies can be used to stop spam.Based on the comparative discussion presented on the report, there is a recommendation section to understand how to use two of the technologies in the given scenario to stop spam."

Reference no: EM132199676

Questions Cloud

How will your communication strategies change for each group : Describe one internal and one external method for the dissemination of your EBP project results. For example, an internal method may be the hospital board.
Conduct a deep dive research session into subject company : Research is based upon the ability to focus on the appropriate problem and adequately defining it, not what is necessarily the surface issue.
Discuss the process of debt accumulation : Loans and Debt. Discuss the process of debt accumulation in poor countries, ie, how loans are granted, fall behind in payment, and eventually
What is the market price of the bond : There is an 8%, 25 year bond which was issued 5 years ago. If the market rates of interest are 2%, what is the market price of the bond
Briefly describe the technologies : Research Report - Compare and contrast the two technologies: what are their good points and (more interestingly) their bad points or weaknesses
Derive the marginal revenue curve for the firm : The David Company's demand curve for the company's product is P = 2,000 - 20Q, where P = price and Q = the number sold per month.
Land available to raise apples and beets : A farmer has 150 acres of land available to raise apples and beets.
Price elasticity of demand : The demand curve is Qd = 200 - ¼ P. Calculate the (point) price elasticity of demand when price is $24. Is demand elastic or inelastic?
Determine the effectiveness of your change : In order to evaluate an evidence-based practice project, it is important to be able to determine the effectiveness of your change.

Reviews

len2199676

12/20/2018 10:02:46 PM

Note: This is not a group project. Each student must individually complete all parts of their submission. Students must start with a new document and they must not have another person’s file in their possession at any time. Students are welcome to discuss the task with each other (and with the lecturer), but each student must write their assignment independently and not show their work to other students.

Write a Review

Computer Network Security Questions & Answers

  What kinds of things do you think the administrator will see

A network administrator views the output from the "show ip route" command. What kinds of things do you think the administrator will see on the output?

  Implement a secure network infrastructure

Implement a secure network infrastructure for a commercial LAN or WAN environment - Understand the impact on the social and commercial environment of network security design

  Review of article where physical security failed

Review of Article Where Physical Security Failed. Propose a possible change in that organization's physical security that could have prevented the breach.

  What is the difference between war driving and war chalking

What is the difference between War Driving and War chalking? What do you get from a cloud provider when you sing up for an infrastructure as a service (laaS) cloud computing model?

  What is an ips and do we need one in an e-commerce network

What is an Intrusion Prevention System (IPS) and do we need one in an e-commerce network? Do we need a group of network personnel to monitor the e-commerce network for intrusions 24/7?

  Classify vulnerability using the risos model

Classify this vulnerability using the RISOS model, classify this vulnerability using the PA model and justify your answer

  Prepare a security checklist for new century

You decide to prepare a security checklist for New Century. Prepare a list of security issues that the firm should evaluate and monitor. Be sure to organize the items into categories that match the five security levels.

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

  What should be considered in an acceptable use policy

What should be allowed as acceptable behavior when using corporate information resources?

  Developing a simple biometric authentication model

Developing an encryption/decryption demo (mainly for learning and teaching purposes)

  Implement organization-wide governance and privacy program

Implement an organization-wide Governance and Privacy Program to ensure compliance with applicable laws and regulations in regards to all matters of handling PII.

  What was the digital crime and who was the subject or what

select a real world event related to digital forensics. this could be a crime a well documented breach or intrusion or

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd