CO4610 Foundations of Cybersecurity Concepts Assignment

Assignment Help Other Subject
Reference no: EM132773245

CO4610 Foundations of Cybersecurity Concepts - University Of Chester

Learning Outcome 1: Show clear understanding of key cybersecurity terminologies. LO2: Discuss common technical weaknesses and security measures.
Learning Outcome 3: Demonstrate a conceptual understanding of threats and resolutions with respect to Information and System Security.
Learning Outcome 4: Demonstrate understanding of knowledge, and a critical awareness of cybersecurity core concepts and
techniques.

Exercise 1: Speaking Cyber

In 2016, a group of hackers known as the Hacking Team got hacked by a self-described black hat hacker. The hacker subsequently dumped their findings and also explained how the hack happened. It was alleged that "Hacking Team was a company that helped governments hack and spy on journalists, activists, political opposition, and other threats to their power". Read about ‘How Hacking Team got hacked' and address the following:

A. Briefly summarise what happened. Find out what you can on the actors, including the attacker and the target(s), and possible motivations.

B. Identify and explain at least three cybersecurity terminologies from (A) above. Where the term was used, define the term, describe in what context it was used, and give some details. E.g., if "attack vector" is mentioned, then what is ‘attack vector', what was the attack vector used and what did it achieve?

It is expected that you will use published materials like online articles, books, journals, conference papers, news articles etc. and these should be properly referenced. You may want to start from here and here.

Note: You can use any format of your choice. For example, you may address (A) and (B) separately, in separate sections, or together. So, whether you choose to cover both parts together or separately, the most important thing is that the report shows your understanding of what happened, the actors, possible motivations and terminology identification and explanation.

Note: The Portfolio as a whole is 2000 words equivalent with a ±10% flexibility. With the weighting of all the portfolio parts in mind, the aim of this exercise is roughly 500 words equivalent, though the word count of each exercise is not strictly controlled.

Exercise 2: Auditing

A. Briefly explain the use of Windows Registry and demonstrate how the registry can be analysed using RegShot.

Your discussion should show understanding of regedit and the structure of the registry. For the demonstration, you are required to do the following:
i. Install RegShot on a Windows machine. You are strongly advised to use a virtual machine (VM) as you may not be able to undo any registry changes you make. You can use a university provided VM or one on your personal PC.
ii. Take a snapshot of the system's registry.
iii. Perform some system changes or install a new software. That is, carry out any activity that will cause some registry entries.
iv. Take a second snapshot of the registry. This must be done after (iii) above.
v. Compare the two snapshots and briefly discuss your findings. Use screenshots to document this exercise.

B. Using the Group Policy Editor on Windows, modify the local audit policy to audit account logon events on the system, including both successful and failed account logon events. Apply the policy and attempt to generate logs by logging into the system with both valid credentials and invalid credentials in order to trigger the newly configured policy. You should then show the Windows Event Viewer logs generated as a result of the policy change and discuss what each security log shows in detail. You should detail and discuss all the steps taken to achieve this task throughout. You are advised to use a virtual machine (VM) for this exercise, to prevent unintended damage to your system, you may either use a university provided virtual machine (VM) or create one to use for this task on your personal PC.

Note: For this task using a Windows virtual machine, you will need to modify default Windows security policies using the Group Policy Editor to allow for account logon events to be audited in the event of both successful and unsuccessful account logon events. For higher marks you should ensure that all steps and your understanding are clearly shown. You should note that both screenshots and captions DO NOT count towards the overall word count, therefore your discussion should be detailed. For guidance on this task, you should refer to the lecture notes to remind yourself on how to configure security policies on Windows.

Note: The Portfolio as a whole is 2000 words equivalent with a ±10% flexibility. With the weighting of all the portfolio parts in mind, the aim of this exercise is roughly 600 words equivalent, though the word count of each exercise is not strictly controlled.

Exercise 3: Python

Alice and Bob need to individually and separately generate the same encryption (secret) key to allow them securely exchange a message (read about Diffie-Hellman key exchange). To do this, in this case, they both need two public numbers (p = 353 and α = 3). Alice calculates an individual public key (YA = 56) and sends it to Bob. Bob calculates an individual public key (YB = 260) and sends it to Alice. To generate the secret key (K), Alice and Bob would need their individual private keys (XA and XB respectively) and the individual public keys they received.
The relevant equations are:
YA = ∝XA mod p
YB = ∝XB mod p
KA = YBXA mod p OR KB = YAXB mod p

Write a python script that will crack (brute force) the values of XA and XB and use them to generate the secret key (K). You must comment your code and explain the steps.

Hint: You already know the values of (p = 353, α = 3, YA = 56, and YB = 260). mod p means ‘modulus p‘ (check the mathematical notation for modulus). Your range is 1 to p - 1, which means 1 - 352. You are looking for the values of XA and XB such that KA = KB.

Note: The Portfolio as a whole is 2000 words equivalent with a ±10% flexibility. With the weighting of all the portfolio parts in mind, the aim of this exercise is roughly 400 words equivalent, though the word count of each exercise is not strictly controlled.

Exercise 4: Security and Cryptography

A. What is Frequency Analysis?

B. Using Frequency Analysis technique, cryptanalyse the following ciphertext:

"dfi du cei tpwr du rdnsafm pf ifqkwxcig oirrpmi, au cei npfmvpmi du cei xnpafcizc ar lfdtf, ar cd uafg p gauuikifc xnpafcizc du cei rpoi npfmvpmi ndfm ifdvme cd uann dfi reiic dk rd, pfg ceif ti qdvfc cei dqqvkkifqir du ipqe niccik. Ti fdci pfg qpnn cei odrc ukijvifcnw dqqvkkafm niccik cei ‘uakrc', cei fizc odrc dqqvkkafm niccik cei ‘riqdfg' cei udnndtafm odrc dqqvkkafm niccik cei ‘ceakg', pfg rd df, vfcan ti pqqdvfc udk pnn cei gauuikifc niccikr af cei xnpafcizc rpoxni. Ceif ti nddl pc cei qaxeik cizc ti tpfc cd rdnsi pfg ti pnrd qnprrauw acr rwohdnr. Ti uafg cei odrc dqqvkkafm rwohdn pfg qepfmi ac cd cei udko du cei ‘uakrc' niccik du cei xnpafcizc rpoxni, cei fizc odrc qdoodf rwohdn ar qepfmig cd cei udko du cei ‘riqdfg' niccik, pfg cei udnndtafm odrc qdoodf rwohdn ar qepfmig cd cei udko du cei ‘ceakg' niccik, pfg rd df, vfcan ti pqqdvfc udk pnn rwohdnr du cei qkwxcdmkpo ti tpfc cd rdnsi"

Note: You are required to show and explain all the steps taken to deduce the plaintext. Marking criteria for this task will mainly focus on the steps taken (which needs to be explained) rather than getting the plaintext correct. Deducing the correct plaintext counts for only 20% (4 marks) while the steps taken and the knowledge shown count for 80% (16 marks). So, using an online tool to crack the ciphertext won't be that helpful.

The ciphertext doesn't count in the word count

Note: The Portfolio as a whole is 2000 words equivalent with a ±10% flexibility. With the weighting of all the portfolio parts in mind, the aim of this exercise is roughly 400 words equivalent, though the word count of each exercise is not strictly controlled. The ciphertext doesn't count in the word count.

Exercise 5: Critical review and Conclusion

Based on the previous 4 exercises, critically review and conclude the portfolio. The discussion here should address the following questions:

A. What is the one new thing you have learnt?
B. What is the most challenging exercise for you and why?
C. What can you do differently next time?

This is a free-form portion of the portfolio that is intended to show the student's reflection on process, demonstrating learning, awareness of strengths and weaknesses and identification of possible areas for improvement.

Note: The Portfolio as a whole is 2000 words equivalent with a ±10% flexibility. With the weighting of all the portfolio parts in mind, the aim of this exercise is roughly 100 words equivalent, though the word count of each exercise is not strictly controlled.

Attachment:- Portfolio.rar

Reference no: EM132773245

Questions Cloud

Calculate the depreciation expense for oriole pants company : Calculate the depreciation expense for each year of the equipment's life.(Round depreciation rate to 2 decimal places for all calculations)
What is the adjusted book balance on November : In the course of our audit of SOCIALDISTANCING Inc.'s cash in bank for the year ended December 31, 2019, What is the adjusted book balance on November
How the proposed strategy could be evaluated : Now that you have formulated your strategy for your chicken and egg (poultry) farm , your team wants to know how the proposed strategy could be evaluated.
Calculate the equipment carrying amount at december : Calculate the equipment's carrying amount at December 31, 2017.Pharoah Technology purchased equipment on January 4, 2015, for $251,600.
CO4610 Foundations of Cybersecurity Concepts Assignment : CO4610 Foundations of Cybersecurity Concepts Assignment Help and Solution, University Of Chester - Assessment Writing Service
Describe the tax consequences of the bonus declaration : The bonus will be paid on February 1, 2020. Describe the tax consequences of this bonus declaration and payment on both Stan Gable and Brock Inc
Explain the benefits of a performance management system : Scenario, explain the benefits of a performance management system in terms of employee and organizational success.
How record cost method journal entry to record acquisition : How do Record the cost method journal entry to record the acquisition on Newer's books. On January 1, 2020, New Inc. buys 10% of Newer Co.
Will the cash receipts and payments leave digital : Will the cash receipts and payments leave Digital with the desired ending cash balance of $75 million, or will the company need additional financing?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd