Openpgp-compliant email software package on your computer

Assignment Help Computer Network Security
Reference no: EM13869905

Public- and private-key pair (Group Project) Print Page This is a 2-Week project that contains two main tasks. You need to manage your time well to be able to finish both tasks on time. The submission of the final document is due by Wednesday of Week 4, but your contribution in the Group Project forum will be marked throughout the 2-Week period, so your regular participation is important. As you progress in your work, use the 'Sample Template for document submission' to track your deliverables.

Task 1 (to be completed by the end of Week 3): Install an OpenPGP-compliant email software package on your computer, like any of the ones found at the OpenPGP Alliance (n.d.) Web site or any product in compliance with RFC 4880 (Network Working Group, 2007). GnuPG (The GnuPG Project, 2014) in particular is freely available and widely used.

You are welcome to use PGP itself, but note that as of 2010, PGP is owned by Symantec and is only available as a commercial product (Symantec, 2014). You may wish to try the Enigmail add-ons for Thunderbird (Brunschwig, 2013). For the purposes of this Group Project, any of these OpenPGP-compliant products will be referred to as 'PGP'. For the project, generate a public- and private-key pair for yourself.

If you have any problem in installing it properly, please discuss this in the Group Project forum with your team members. Publish your public key in your project exchange folder. Optionally, export your public keys to one or more of the PGP key servers.

If you publish your keys there, your email address will also be public there. If you feel you do not want to publish your email address there, you can choose not to do so. You can also generate a key for some email address that you do not care about and publish the corresponding key for that email address to the PGP key servers. Post some encrypted messages for each of your project colleagues in the Group Project forum.

You can also publish the ciphertext in your Group Project forum. Be sure to post these encrypted messages in the Group Project forum, not private email boxes, since the Instructor cannot read your private email box and, hence, cannot give you a grade. If you get an encrypted message for yourself, decrypt it and ask the sender to verify that the message is correct.

By the end of Week 3, you should have finished the installation of PGP, published your public key, published the encrypted messages to your colleagues and decrypted the messages for you (posting the messages in the folder for verification). All work should be done in the Group Project forum.

Reference no: EM13869905

Questions Cloud

Concentrate on the digital signatures and certificate chain : You will concentrate on the digital signatures and certificate chain. Try posting messages signed with your private key and ask your colleagues to verify whether your signature on the message is valid. The message should not be encrypted; that is,..
Show that the above system of equations : Show that the above system of equations can be derived from the Law of Mass Action. Do this by finding reactions that give rise to these equations.Also, assumptions are made about the rate constants to obtain these equations and you should make sure ..
What other marketing actions would you recommend : What factors must you consider when deciding when to release your movie? How many tickets does your movie have to sell to break even in the first week? What other marketing actions would you recommend
What about their proposed resolution : What other connections do you see between their future career vision and the ethical principles, standards, and codes of conduct you reviewed
Openpgp-compliant email software package on your computer : Install an OpenPGP-compliant email software package on your computer, like any of the ones found at the OpenPGP Alliance (n.d.) Web site or any product in compliance with RFC 4880
Explain how the organization is using six sigma and why : Explain how the organization is using Six Sigma, and why. Research and describe a business that currently using Six Sigma
An eigenvector and an eigenvalue : What is the difference between an eigenvector and an eigenvalue?
Identify someone in your community who is a manager : dentify two major problems that the manager mentions and ask how he or she has responded to those problems. What solutions has the manager tried? Have the solutions worked What does the field of I/O say about these types of problems or issues
Explore the leaks and news media accusing the us : You will explore the leaks and news media accusing the US and other countries of launching MiTM attacks - Choose one of the MiTM cases discussed in this Week's lecture notes and study it.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Loss of privacy

Loss of privacy - define, give examples; explain two examples in detail. Discuss local, global, societal issues. Give a personal prediction on major privacy issues in the next 10 years.

  Information security profile for your organization

Submit an Information Security Profile for your organization. This project requires you to summarize the required controls and describe the security posture of your organization based on its selected Information security standard

  Analyze specific potential malicious attacks

Analyze specific potential malicious attacks and / or threats that could be carried out against the network and organization and explain in detail the potential impact of the three selected malicious attacks

  Certification and accreditation for commercial systems

Using Network Security Certification and Accreditation for commercial systems. Do you think a formal process like Certification & Accreditation is appropriate to use for commercial systems in private industry (Why or Why Not)?

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Briefly identify the compliance

Pick an organization from either the eCommerce sector (anyone trading in products or services using the Internet) or the Banking/Finance sector

  Identify a recently announced security vulnerability

Your task is to identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Access control models

Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below

  Discuss pci dss control objectives and requirements

Discuss PCI DSS control objectives and requirements. Discuss PCI DSS compliance requirements.

  How to set up or improve their cyber security

How should government justify telling private industry how to set up or improve their cyber security

  Discuss the issue of security challenges on the internet

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least 5 Internet security challenges

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd