List and explain key objectives of information security

Assignment Help Computer Network Security
Reference no: EM131188767 , Length: word count:1000

COIT12202 -Network Security Concepts Assignment

Short-answer questions

Question 1: Information security is used to describe the tasks of protecting information in a digital form.

(1) List and explain three key objectives of information security.

(2) Also list and explain at least two additional protections (concepts)to present a complete view of information security.

Question 2: ARP (Address Resolution Protocol) Poisoning is a form of attack in which an attacker sends falsified ARP messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.

(1) Use an example to illustrate (diagrams or written explanation) the ARP Poising attack process and

(2) Explain at least two strategies to prevent such kind of ARP spoofing.

Question 3: Integrity protection is used to guard against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

(1) Explain the kinds of technologies (algorithms) that can be used to guarantee data integrity.

(2) Provide two examplesof data integrity and

(3) Explain how DLP (Data loss prevention) can be used to prevent data leakage.

Question 4: The earliest and the simplest use of a substitution cipher was by Julius Caesar.

1804_Figure.png

Assume that Alice received the following message "skkzskglzkxznkzumgvgxze" from Bob, who used Caesar Cipher to let Alice know "meet me after the toga party".

Please complete the following tasks:

(1) Explain the cryptographic algorithm of Caesar Cipher.

(2) Explain what the plaintext is, what the ciphertext is and what the possible key value is.

(3) Explain an approach that can be used to attack Caesar Cipher. Is it possible to improve the cryptographic algorithm?

Question 5: RSA is an algorithm to encrypt and decrypt messages. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described RSA in 1978. A user of RSA creates and then publishes the product of two large prime numbers along with an auxiliary value as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. However, with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.

Answer the following questions:

(1) Explain whatcategory of cryptographic algorithms RSA belongs to.

(2) Explain how RSA is used to achieve thecryptography (encryption and decryption) and digital signatures.

(3) Explain the main weakness of digital signatures and how this weakness can be compensated for.

Reference no: EM131188767

Questions Cloud

Consistent with the business cycle theory : a) Unemployment is strongly countercyclical. Is this stylized fact of the business cycle fact consistent with the Business Cycle theory?
Determine the net work output, in kw h per year : A power cycle receives energy by heat transfer from the combustion of fuel and develops power at a net rate of 150 MW. The thermal efficiency of the cycle is 40%.
Which quality process improvement tools would bring benefit : Now that you have defined the quality dimensions, you will need to determine which quality process improvement tools and techniques would bring the biggest benefit to your project.
Means of encouraging improvements in human rights : More than 500 U.S. firms have developed offices or factories in China. Many other U.S. firms have become exporters to China in recent years. However, the U.S. government has periodically threatened to restrict business between the United States and C..
List and explain key objectives of information security : Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..
Analyze planned actions in soliciting and awarding contracts : Analyze the planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency in question is in compliance with the FAR requirements.
Compute the total cost of inventory : Joe's Bar (not its real name) uses 800 kegs of adult beverages per year on a continuous basis (assume 365 days of operations per year). Determine the reorder point d. Compute the Total Cost of Inventory.
How would you carry out the analysis : Under pressure by regulators and consumers, the company is considering lowering the price of the medicine by 10 percent. The company has hired you to analyze the effect of such a cut on its profits. How would you carry out the analysis? What infor..
Define incremental cash flow : Define incremental cash flow and Should you subtract interest expense or dividends when calculating project cash flow - Calculate the annual sales revenues and costs (other than depreciation). Why is it important to include inflation when estimating..

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are few security compromises that were faced in past

What are the few security compromises that were faced in the recent past due to lack of internet and e-Commerce security competencies?

  Explain the advantages of ipv6 when compared to ipv4

Explain the advantages of IPv6 when compared to IPv4

  Computer security models

Use the Internet to research the following computer security models: Biba (Biba Integrity Model), Give a brief synopsis of each model in your own words. Please cite any references that you use to complete this assignment

  Network infrastructure and security

Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  What are computer-based threats to your individual privacy

What are the computer-based threats to your individual privacy in American culture? Who is behind these threats to your individual privacy? Would you be willing to give up certain levels of privacy for better security?

  Case study incident-response policy-gem infosys

Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days

  Guidance provided by department of health and human services

Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements

  Calculate the total gross pay for each employee.

Calculate the total Gross Pay for each employee. Keep in mind that employees are paid time and a half for all over-time hours. Here is an example formula that demonstrates how you would make such a calculation: =b4*d4+b4*c4*1.5 These must be formu..

  Consider the following authentication protocol

Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)

  What do you see as the role of computer forensics in

question 1 what do you see as the role of computer forensics in recovering from cyber attacks?question 2 how might

  Construct a secure mac scheme by using prf

Prove the security of the MAC scheme you constructed in the previous item. In order to get the full bonus points, you are expected to provide a rigorous security proof and construct a secure MAC scheme by using PRF.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd