CSE1ACF Cyber Algorithms That Changed the Future- Assignment

Assignment Help Computer Network Security
Reference no: EM132394348 , Length: word count : 1500

CSE1ACF: Cyber Algorithms That Changed the Future

Assignment : Design and Implementation of Cyber Algorithms

1000-1500 words

Goal

To demonstrate your knowledge of the following:

• Express a set of ordered steps in a formal language;

• Illustrate the use of algorithms in solving cybersecurity problems

• Analyse the steps required to execute an algorithm correctly

Assignment

You lead a team of security experts responsible for the designing and setting up the security infrastructure of a large international bullion trading company (specialising in gold and silver precious metals in the form of coins, ingots, or bars) with offices in Australia, Asia, Europe and the USA.The company employs a total of 1300 staff in 13 cities worldwide.

The trading system was designed and implemented by a 3rd party software company 15 years ago using Windows XP as the front-end with password access control. The server is running Windows Server 2012 located in Sydney with a backup site in London.

Recently, the organisation has received confidential information from the Interpol that forgery orders have been placed by “ghost” traders within the organisation and “fake” coins and bars have beenshipped from some branches in Europe.

The board is highly concerned with this allegation and wants your team to find out what had gone wrong with the trading system and identify any remedial actions could be taken to stop future similar allegation.

Your team is required to perform the following:

• Identify any possible weaknesses in the existing operating environment;

• Recommend any automated and manual measures to be established to detect, deter, and delete any possibility of “ghost” traders and forgery trades;

• Propose any new procedures and algorithms required to assure the authenticity of traders and the trades. This may include mechanisms to:

o Authenticate and authorise the Traders when placing an order

o Detect any “fake” bullion bar or coin from going in and out of the organisation.

Instructions

Your report should describe your understanding of the problem areas that the company is facing and provide evidence how your team have identified the footprints left by the “ghost” traders.

You may consider using one of the digital forensic investigation models (covered in week 2) to describe the possible types of attacks experienced by the trading system and the impact to the system.

You need to describe your suggested enhancements to the cybersecurity procedures for the company and the required algorithms to be implemented in delivering the enhanced features in the system.

You may also wish to discuss the use of biometric (e.g. face and fingerprint) authentication and authorisation mechanisms as well as the use of symmetric encryption or asymmetric encryption techniques, asymmetric key exchange technique and digital signatures; in protecting the privacy and integrity of trading orders.

You may also consider using error detection and correction techniques (e.g. hash function, Hamming Code, CRC, etc.) to ensure the trade orders are placed and executed correctly.

Furthermore, you may consider the use of automated neural networks and pattern recognition techniques to determine the existence of any “fake” bullion and forgery order in the receiving and dispatching of bullion in each branch office.

For each area of the recommended implementations, your team is required to express the proposed implementation with a set of ordered steps in a formal language (those you have learned in this subject), such as:

• Lexical Analysis to analyse valid trade orders;

• Metawords to describe the properties of a valid trade order;

• Pseudo Code or Turing Machine to explain the steps involved in the authentication, authorisation, neural networks and pattern recognition techniques in error detection;

• Decision Tree, Cluster Analysis, and/or Neuro Network to implement automated detection of “fake” bullion (coin and bar);

You may also consider using diagrams (such as Flow Chart, Network Diagram, Process Flow Diagram, and/or other tools that you have learned in this subject) to illustrate the algorithms that your team is going to implement.

Reference no: EM132394348

Questions Cloud

If you were in charge what approach would you take and why : Please help me answer these questions? Does your current work, school, or organizational affilate managed by stockholder or stakeholde approach?
Recommend the best way to implement the change : Currently there are four Divisional Vice Presidents that oversee 15 District Managers each. Moving forward, there will be two Divisional Vice Presidents.
Receive constructive feedback on performance : Anyone can give some examples how often should my employees receive constructive feedback on their performance.
Describe the four types of work relationships : Your manager has requested you to assist with training on work relationships. Describe the four types of work relationships and a real-life scenario.
CSE1ACF Cyber Algorithms That Changed the Future- Assignment : CSE1ACF Cyber Algorithms That Changed the Future Assignment Help and Solutions-La Trobe University, Australia-You lead a team of security experts responsible.
Coordination between these three areas of a firm : What is the relationship between SCM, marketing, and operations? What activities require coordination between these three areas of a firm?
The cell theory- function starts at this level : The cell theory- function starts at this level. What was your favorite topic this week? What did you enjoy? Find a video that relates to this topic.
Discuss the knowledge and problem solving ability : After viewing the video below and reading the Module 4 Introduction and instructional materials, prepare a document that is a problem-based case study essay.
Unpleasant jobs an inevitable part of any economy : Are dirty, dangerous, and unpleasant jobs an inevitable part of any economy? Identify two other such jobs that you think fall into this category

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd