Identify a recently announced security vulnerability

Assignment Help Other Subject
Reference no: EM131740629

Cryptography

Question 1:

Security professionals need to ensure that they keep up to date with the latest threats and security issues. This allows them to update their risk profiles, such as identifying if their systems are vulnerable. In order to determine what the risk to an organisation is, you need to know what the problems could be.

In this assignment, your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack, mitigation strategies and concluding reflection (100 words) on the adequacy of the mitigation strategies. The risk to an organisation using vulnerable systems should also be determined.

Your report should be maximum 2 pages and should contain relevant tables, calculations, a ranked list of threats (in terms of impact) and conclusions.

Question 2:

You are required to learn the GPG/PGP package using Linux Kali environment (learning the applications of private and public key cryptography to secure email messages and documents) to be able to answer the following questions. You should pair up with one of your class fellow to do this lab and record results and give commentary on the results.

If you do not have a class fellow then create two user accounts and you can encrypt using one account and descript using other account.

a) Generate keys of 2 different sizes for RSA encryption scheme and include these keys in the report.

b) Encrypt a file (text or binary) using 2 key sizes and include your results and note the observation

c) Create a file of close to 1 GB and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken. Calculate how long it would take to do the encryption/decryption of a 10 GBs of data.

d) Export your public key and discuss the reason why your exported key should be in ASCII format.

e) Encrypt a file and output the cipher text in ASCII format. Explain when you need cipher text in ASCII format.

f) You should work with your class fellow/or create two accounts to do this experiment and record your observation in the form of commands being used or procedure being followed and includeyour results.

I. Exchange your public key and your friend's public key using email.

II. Import your friend's public key into your key ring.

III. Encrypt a file using your friend's public key and send the encrypted file to your friend.

IV. Ask your friend to decrypt the encrypted file.

V. You can ask your friend to do the same thing.

g) Write a reflection report in 100 words about the role cryptography can play in ensuring right to privacy of individuals.

Verified Expert

Please find enclosed answer as per the requirement. In this paper, I have used various diagrams which are used to develop a system. First I have developed ERD in vision in which I have shown six entities - its user, owner, guest, property, credit card, billing. Then I have developed DFD/ CFD which shows various processes which can be used to develop property online rental framework.

Reference no: EM131740629

Questions Cloud

Discuss strategies for negotiating the best settlement : Discuss strategies for negotiating the best settlement possible if your opposition has more power - or leverage in the situation than you.
Specific heat and density of the solution : Assume the specific heat and density of the solution after mixing are the same as those of pure water.
Define the shield of achilles depict in the iliad : What sort of world does the Shield of Achilles depict in the Iliad. How do the "two noble cities" differ and how do they fit into the epic
Describe sons management style : Describe Son's management style. What are the cultural issues both at the company and country level that might affect Sprint.
Identify a recently announced security vulnerability : Identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attack
Discuss the birthmark represent himself in a way : obsession one with his wife, one of science, or does the birthmark represent himself in a way? Can the answer be all three
Contents of the reaction mixture down the sink : Considering the chemical equation for the reaction between these two substances, why do you think it is okay to pour the contents of the reaction mixture down
Why do entrepreneurs want to retain control of the companies : Why do entrepreneurs want to retain control of their companies? Explain why that control may not be good for the company and other shareholders?
Reduce the toxicity of copper : Other than pH, list two different water quality parameters that would reduce the toxicity of copper? Briefly explain why the toxicity is reduced by each factor

Reviews

inf1740629

1/22/2018 4:36:52 AM

As in my first email, I attached my lecture slide also which will help in making this assignment so u can go to last slides of lecture slide I send u there is an example of context diagram So U have to make something like that. There are more levels of it so more than one diagram to explain this point. So as diagrams are connected based on above diagram. pspec and capex. It will also change Became values wil be different after the change in above diagram so those both require change. In data dictionary, I need more explanation is required. I also need to know which tool u will use to make diagrams in case if lecturer asks me. That is 1. Context. Diagram 2. Dfd level. 1 diagram 3.dfd. Level 2 diagram

len1740629

11/28/2017 4:01:33 AM

hi plz find the attachment file this assignment of information security there are 2 questions in assignment which need to be answer you have to make in que - 1 or how to solve que - 2 its all mention there as well as scoring criteria of both question is also mention so plz keep that in mind. And make according to that and I need it by 4th morning so that I make it check by lecturer and if any changes require I will tell you to make . plz put 1. table of contents 2. in text citation 3. references in APA style please tell me the price in aud dollar and please be reasonable and charge less any more information will be there I wll let u know. plz reply as soon as possible

len1740629

11/28/2017 4:01:18 AM

Spelling and Grammar 5 The presentation’s content is appropriately written in English, with no spelling errors and grammar issues. Presentation and Style 5 The report is well presented, with diagrams, headings, tables and other visual aids. References 5 The report contains appropriate references and referencing style. Subtotal: 15 Subtotal for presentation Total: 50

len1740629

11/28/2017 4:01:11 AM

Scoring Type Score Description Content 3 keys being generated 5 Keys of different sizes should be generated, contents of keys included and size estimated File encryption 5 File encryption with two keys and results included with observation Large file encryption 5 Analysis and observation of encryption time for large files ASCII format 5 Need for keys and encrypted files to be in ASCII format Key exchange for cryptography 5 Observation of key exchange and encryption and decryption Reflection on use of cryptography 10 Role of cryptography in ensuring right to privacy Subtotal: 35 Subtotal for content Presentation

len1740629

11/28/2017 4:01:00 AM

See the scoring sheet for this assignment, and ensure that your report fulfils the criteria listed. Scoring Q1: Type Score Description Content Fits with a profile 8 Appropriately choose a profile and stay within the parameters given. Reports that go outside the bounds will lose marks from this category. Profile completion 10 Completes the problems identified within the profile. You gain marks for ensuring that all of the points mentioned in the profile are covered in your report. Law 5 Reports should cover the impact of the law on their profile International scope 12 Your problem is placed within the international security scene, appropriately justified and excellent concluding reflection. Subtotal: 35 Subtotal for content Presentation Spelling and Grammar 5 The presentation’s content is appropriately written in English, with no spelling errors and grammar issues. Presentation and Style 5 The report is well presented, with diagrams, headings, tables and other visual aids. References 5 The report contains appropriate references and referencing style. Subtotal: 15 Subtotal for presentation Total: 50

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd