Organization managing public information on its web server

Assignment Help Computer Network Security
Reference no: EM13762236

Question 1:

(a) Comment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.

(i) An organization managing public information on its Web server.

(ii) A law-enforcement organization managing extremely sensitive investigative

(iii) A financial organization managing routine administrative information (not privacy-related information).

(b) Explain, with examples, what active attacks are and how one would counter such attacks.

Question 2:

(a) (i) Apply stream ciphering encryption technique and describe how it can be used to provide confidentiality of messages. Illustrate your answer with an example.

(ii) RC4 algorithm is a common example of stream ciphering. Briefly explain the possible strength and weakness of this algorithm.

(b) (i) Consider the following message packet;

    Actual Data    Timestamp      Sequence Number

Suppose there is a secret key algorithm and Alice and Bob share a secret key for this algorithm. Message authentication is achieved using hash function. Discuss a possible problem scenario, given that an adversary Charles gets hold of the message and the hash function is not strong?

(ii) Apply Caesar's substitution cipher and determine the ciphertext for the message "cybersecurity", if the key is equal to 6.

Question 3:

(a) Demonstrate the TWO common approaches to providing message authentication without encryption. Illustrate your answer with the aid of appropriate diagrams.

(b) Apply public-key system (PKS) technique to describe how message authentication can be achieved. Illustrate your answer with the aid of a diagram.

Question 4:

(a) You have just been joined a company as their network administrator. As the network infrastructure is undergoing changes, you are asked to look into the possibility of implementing an intrusion detection system (IDS). Based on your initial observation, you found out that there were shortages of IT personnel as many of them have either left or retired. You got hold of some preVious information relating to the staff's profiles and system usage statistics. Management has no issue on approving the budget for the implementation of an IDS system.

(i) Based on the information given, will you be able to recommend which approach of intrusion detection system to implement or would more studies still need to be conducted. Justify your answer.

(ii) Whichever IDS approach recommended, are there any intrusions that are difficult to detect? Illustrate your answer with an example.

(b) Apply using packet filtering firewall and explain how this type of firewall can be used to provide security protection to an organization. Illustrate your answer with appropriate example.

Reference no: EM13762236

Questions Cloud

How does technology affect the productivity : How does technology affect the productivity and cost of the industry you currently work for or you are familiar with? How do the technical and economically efficient concepts shape the long-run average total-cost curve of this industry?
Logical expression : write a short paper on what your program does. Include the logical expression and what type of while loop (EOF, sentinel-controlled, counter-controlled, flag-controlled) you need. Using the same logical expression as above, use a different while l..
What do you believe is solution to social security crisis : What do you believe is the solution to the Social Security crisis? Why do you think reforms have not been implemented despite the consensus that the program is unstable?
Compresses a horizontal massless spring : A block of mass 2 kg is kept at rest as it compresses a horizontal massless spring (k = 120 N/m) by 8.52 cm. As the block is released, it travels 0.611 m on a rough horizontal surface before stopping. The acceleration of gravity is 9.8 m/s2 . Calcula..
Organization managing public information on its web server : omment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. An organization managing public information on its Web serv..
Dilutive eps of wonderful incorporation : If Wonderful has 29,000 shares of common stock outstanding throughout the year and its Net Income is $12,000 after paying the preferred dividends, what will be the dilutive EPS of Wonderful incorporation under treasury stock method? Round your ans..
An object of mass m is lowered at constant velocity : An object of mass m is lowered at constant velocity at the end of a string of negligible mass. As it is lowered a vertical distance h, its gravitational potential energy changes by?Ug = -mg hHowever, its kinetic energy remains constant, so that if we..
Recognize compensation expense on books : The service period is for 3 years, beginning January 1, 2010. As a result of the option granted to Wine, using the fair value method, Ellison should recognize compensation expense on its books in the amount of
Developing ipv6 : What is the primary reason for developing IPv6

Reviews

Write a Review

Computer Network Security Questions & Answers

  Consider the following authentication protocol

Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Describe the environment of your forensic workstation

Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory.

  Write a succinct policy statement specifying employee

Summarize the primary vulnerabilities and potential threats that exist for GCI related to the practice of storing sensitive data on laptops. In your opinion, which of the risks GCI faces are most significant to the company?

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

  Ideas for energizing a project team

Assume you are introduced to a assignment manager, who does not have authority to give a pay raise or promote a project team member.

  How you could use one or more

Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file

  Find the checksum at the sender site

This problem shows a special case in checksum handling. A sender has two data items to send: Ox4567 and OxBA98. What is the value of the checksum?

  Specific challenges with overlapping of jurisdictions

Identify the specific challenges with overlapping of jurisdictions and propose solution(s) for overcoming these challenges

  The process of implementing security opens one''s eyes

the process of implementing security opens one's eyes to other forms of security they hadn't thought of previously. Well, in this assignment you should experience just that.

  Guidance provided by department of health and human services

Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd