Is security really all that important to you

Assignment Help Computer Network Security
Reference no: EM131001056

Objectives:

- Write a reflection
- Hash files to verify their authenticity
- Use the cloud-based Dropbox to share content

- Learn how to create an encrypted disk image (Mac) or an encrypted VHD (PC)

Note: We will be discussing many of the assignment details in class.

Tasks:

1. REFLECTION: Spend some time thinking about how you view computing security in a connected world. Is security really all that important to you? Do you feel vulnerable? Do you feel like you are doing enough to protect yourself? Are you thinking about ways of enhancing your security?

Is there too much hype with respect to various breaches in security? Do you have anything to hide? What are your thoughts? Write a 350 - 400 word reflection.

- Please name your file as follows: LastName_FirstName_Reflection2.

- Reflections are personal introspections. There are no right or wrong answers.

- There is nothing wrong with doing a little reading before writing a reflection if you choose to do so. Just keep in mind that the reflection ultimately consists of your perspective.

-Take the reflection where ever you please.

- The reflection is informal, but reasonable spelling and grammar is appreciated.

- doc, docx, or PDF format only. Please ensure your name, student number, course number, and assignment number are in the header.

2. Examine the nine text files located in the folder found at:

https://www.dropbox.com/sh/ymp4t54s73hisiw/AAD7yXVqmFLfuKGiOgmXPHVqa?dl=0

At least one of them contains an "original" document representing the novel "A Christmas Carol" by Charles Dickens. Your task is to find out which of these nine very similar documents are original. It is known that the SHA-256 hash of the "original" document is:

HEX: F0968458E7E0823103872A503A350D90E607DE71E2B2BF486E884C746CDF3EEE

Which of these nine documents is an "original"? List out the SHA-256 hashes of each of the documents. Create a PDF document that contains your answer.

3. Upload your PDF document from (2) to a Dropbox account.

- If you do not have a Dropbox account, create one.

- Upload the PDF document; it doesn't matter where.

- Capture a link to this document and paste it into the comments box in of your assignment submission. Label this link "Question 3".

4. i. Create an event that takes place at a particular time on a particular date in March 2016.

ii. Create an event that takes place all day on a particular date in March 2016.

iii. Create an event that takes place and repeats once a week for all the weeks in March 2016.

iv. Create an event that takes place for five consecutive days (Monday through Friday) in March 2015.

Ensure your Google Form and Google Calendar are publically accessible and paste the URL for each into the comments box of your assignment submission. Label these links "Question 4".

5. As D2L Dropbox requires the submission of at least one file, submit your PDF from (2)

Reference no: EM131001056

Questions Cloud

Determine the rejection region for a hypothesis test : (i) state the appropriate null and alternative hypotheses; (ii) determine the appropriate test statistic; (iii) determine the rejection region for a hypothesis test at the α = 0.05 signi?cance level; (iv) determine the associated p-value. (v) Wh..
How does this actor impact the story of conflict : What are its strengths, limitations, etc? How does this actor impact the story of conflict? In addition to the short assessment (250 words), provide three quotes from the text including page numbers
Prepare the journal entries to record these transactions : Purchases of merchandise on account during the year totaled $845,000. Merchandise costing $902,000 was sold on account for $1,420,000. Prepare the journal entries to record these transactions.
Do you agree that desire has mechanical nature of machine : Do you agree with this model of machines, or do you think that there are processes in the human body, mind or in nature in general that do not fit this framework? Do you agree that desire has the mechanical nature of a machine
Is security really all that important to you : Spend some time thinking about how you view computing security in a connected world. Is security really all that important to you? Do you feel vulnerable? Do you feel like you are doing enough to protect yourself? Are you thinking about ways of en..
Write about youth drug addiction causes and concerns : Write about Youth drug addiction causes and concerns related to sociology
Why are multiple role relationships potentially problematic : Why are multiple role relationships potentially problematic? How can multiple role relationships be either avoided or handled professionally
Using labor market graph with appropriately labelled x-axis : Suppose that in the United States corn production uses land and labor, while beer production uses capital and labor. Labor is mobile between the corn and beer industries, while land is specific to the corn industry and capital is specific to the beer..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain how would you apply operation security opsec

network security-operation security in a corporation - word count 200how would you apply operation security opsec

  What are few security compromises that were faced in past

What are the few security compromises that were faced in the recent past due to lack of internet and e-Commerce security competencies?

  Limited management abilities

Originally Linux/UNIX systems had one all-powerful user called root that managed systems and discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  Evaluate the challenges and security risk

What methodology will you be following to realise your artefact? Describe approach that will be employed to develop your project artefact

  What would be a successful cybersecurity policy

Write an essay on the topic, "Building and implementing a successful cybersecurity policy". The following questions should be covered in the essay: What would be a successful cybersecurity policy

  Discuss a minimum of five event types found in a dhcp log

Discuss a minimum of five event types found in a DHCP log and describe what they refer to and what plan will you follow to assign printers to all the users in the organization?

  Explain common organizational security threats

Create either a PowerPoint presentation, or a training manual, that will help get the team to think about security. This training document should cover the following key areas: 1. Explain common organizational security threats (avenues of attack).

  Discuss some of the problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. (See [Phifer 2000]). Can we solve these problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment?

  Mitigating dos attacks against broadcast authentication

Mitigating DOS Attacks against Broadcast Authentication in Wireless Sensor Networks

  Comprehensive analysis of the business needs

Identify network security measures needed and providing detailed information about them. Network security measures should also include preventative and maintenance measures.

  Specific challenges with overlapping of jurisdictions

Identify the specific challenges with overlapping of jurisdictions and propose solution(s) for overcoming these challenges

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd