Discuss symmetric and asymmetric key encryption

Assignment Help Computer Network Security
Reference no: EM13719377

Question 1:

An important service provided by any system is the ability to run a process on a predetermined schedulewithout human intertention. The "automation" of tasks can reduce the workload of the system administrator significantly. Unfortunately Linux currently offers not one service but potentially three-cron, anacron, and systemd timer units.

In about a page compare and contrast all three systems. Illustrate your discussion by using the systemfiles /etc/anacron and /etc/crontab
and by constructing equivalent systemd service and timer files.

Question 2:

The web administrator of your organisation needs to login remotely to the machine that is running the organisation's public web site. You tell her that the only way to login is via The Secure Shell-which she knows nothing about! Assuming she is logging in via a Linux box write a help document for her containing the following

a. A short introduction to SSH, explaining why it is the preferredway of logging into a remotemachine-this explanation will need to discuss symmetric and asymmetric key encryption.

b. A discussion of the contents of the file ~/.ssh/known_hosts.

Your discussion should include (but not be limitted to):

- how the file is populated,
- how the keys in the file are used by SSH,
- a discussion of "man-in-the-middle" attacks,
- why the hostnames in the file are "hashed", and
- how individual keys can be deleted by ssh-keygen.

c. A description how to configure access so that no passwords are needed-that is by using user asymmetric keys. This will require a discussion (with examples) of the command sshkeygen, the file ~/.ssh/authorized_keys, passphrase protected keys and the commands ssh-agent and ssh-add.

Question 3:

A user comes to you requesting that you create and implement a backup policy for his desktop machine. What he wants, is to be able to place a blank DVD in his Single-Sided DVD-burner at the end of the working day on a Friday and have all the files he has been working on for the week backed up automatically that evening to the DVD!

After a bit more questioning you find out that:
- He frequently creates/deletes and changes files on a daily basis.
- He wants to be able to recover files for any given day.
- He only wants his home directory backed up.
- His home directory contains about 2Gbytes of data.
- His desktop machine has a spare disk (mounted as /spare) that has plenty of free space for temporary storage.

Tasks that need to be done:

a. Using the information above design a backup policy.

Give a detailed description and justification of your backup-policy.

b. Using tar, a shell script or scripts and systemd timer and service files to implement your backup policy.

Reference no: EM13719377

Questions Cloud

Apply the lumped heat capacity theory : A 10 cm cube of aluminium initially in the oven at a temperature of 300c is immersed in boiling water at a constant temperature if 100c and the convection coefficient of h=900 w/m^2.c
The impact of family violence : A historical perspective on how alcohol and family violence have been impacted by legislative changes - The impact of alcohol abuse on both the addicted individual and those around them
For incompressible flow-derive an analytic expression : The open tank contains water at 20C. For incompressible flow, derive an analytic expression for dl/dt in terms of (Q1, Q2,Q3)
How did the producers decide on the best combinations : 1. Think of a business firm you recently visited (such as Walmart, Home Depot, Red Lobster, Barnes & Noble, McDonald's, etc.). What motivated the producers of all the individual products in the store to make them and offer them for sale? How di..
Discuss symmetric and asymmetric key encryption : A short introduction to SSH, explaining why it is the preferredway of logging into a remotemachine-this explanation will need to discuss symmetric and asymmetric key encryption.
What is the growth rate : Submit a 4- to 5-page paper that addresses the following questions. Be sure to use references within the paper to support your answers. Show work for all calculations. 1. (a.) Suppose real GDP was $13.1 trillion in 2013 and $13.3 in 2014, what..
State the first law and indicate what terms will drop out : Water with a specific volume of 0.001 m3/kg flows through a pipe at 5 kg/sec entering the pipe with an initial velocity of 100 m/sec and exiting at 50 m/sec. The exit of the pipe is 100 m above the inlet. The pipe is well insulated and the power requ..
Explain how it affects the purchase process : Describe the model of consumer buyer behavior. Providing a list of the steps or a graphic of the model is not adequate, as you must explain how the process works in the real world using your own words.
Determine the change in temperature of the air : A water cooled compressor with air flowing at 0.1 kg/s enters at a temperature of 27C. The compressor work is 5 kW and the heat transfer rate to the water is 2kW. Use air as an ideal gas (Cp = 1.006 kJ/kg-K). Ignore changes in KE and PE.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Symmetric encryption algorithms

block cipher and a stream cipher, Caesar cipher, cryptanalytic attacks, mono alphabetic cipher and a poly alphabetic cipher, Mix Columns, Add Round key, PGP services, traffic padding, contrast link and end-to-end encryption

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  The message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted

the message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted using a shift transformation c equiv p k mod 26. use

  Security vulnerabilities of vc

single access point (AP), wireless network, CSMA/CA, goals of information security, Wireless LANs, wireless hacking process, Wired Equivalent Privacy (WEP), Open System Authentication and Shared Key Authentication, Initialisation Vector (IV), RADIU..

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

  Use a balanced scorecard system

Why is it reasonable to use a balanced scorecard system to measure staff performance? How does this approach mitigate concerns about measurement dysfunction?

  After the 911 attacks there has been an increased demand

after the 911 attacks there has been an increased demand for private security services. post to the discussion board

  Explaining wan links for point-to-point home office address

Servers, administrative and support users 2 subnets with 50 hosts for faculty & student labs 10 or more WAN links for point-to-point home office address. Design the subnet?

  Peer entity authentication security service

Draw a matrix similar to the table presented in class that shows the relationship between security services and attacks - Peer entity authentication security service

  Outline a plan for the growth of an addressing and naming

outline a plan for the development of an addressing and naming model in an environment of the following scenarioten 10

  Cryptography and network security

CS 470: Cryptography and Network Security,  Compare the RSA and EIGamal signature schemes' performance in terms of efficiency of the verification operation, ability to pre-compute most of the signature operation in advance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd