Understanding of cryptography and its role to n/w security

Assignment Help Computer Network Security
Reference no: EM13951390

Background Readings: To assure a trusted and resilient information and communications infrastructure, it is essential to secure the computer networks. Computer networks are implemented via technology. Part of solutions of their security in essence need to be via technology as well. The following two presentations provide the security protocols common in computer networks.

Kizza. Computer Network Security Protocols and Standards. Presentation.

Perlman, R. (2004), Network Security Protocls: A Tutorial. Presentation.

As you see from the presentations, to understand computer network security protocols, it is important to understand what cryptography is, as it is the building block of security protocols. The following reading provides a thorough review:

Kessler, G. (2011). An overview of cryptography. Retrieved from https://www.garykessler.net/library/crypto.html

If one is new to cryptograph, it takes some time for one to understand it. Maybe some hands-on practice will be helpful. You don't have to get it all figured out, but give it a try. You may find it interesting.

There's a program out there called Pretty Good Privacy (PGP), that provides personal encryption capabilities essentially equal to those available to almost all governments and capable of ensuring information privacy against almost if not absolutely all attacks. It has a long and interestingly checkered history, including having been at one time an illegal munition of war. Originating as freeware, it now exists in both free and commercial incarnations.

You'll also want to look at the discussion and links to some versions of the program on Phil Zimmermann's website (https://philzimmermann.com/EN/findpgp/) and at the GNU Privacy Guard website (https://www.gnupg.org/), which provides a free implementation on the Open Source model.

Now you have been exposed to technical solutions to security. Please also understand the challenges afflicated with technical solutions. The following article pinpoints the forever challenge to technology:

Schneier, B. (2012), How Changing Technology Affects Security. IEEE Security & Privacy. March/April 2012.

Is using an encryption system like PGP a good idea for individuals and organizations? And why?

Looking for:
Ability to consolidate ideas from reading materials.
Demonstration of understanding of cryptography and its role in network security.
Critical views on the advantages and disadvantages of technical solutions to security.

Reference no: EM13951390

Questions Cloud

Record the sale of net assets on the books of crow company : Record the acquisition of the net assets of Crow Company on Bart Company's books. Record the sale of the net assets on the books of Crow Company.
Compare and contrast telnet and ftp and discuss the downfall : Determine whether or not additional components could be added to the IPv4 protocol to enhance its usefulness.
What is relationship between color and wavelength for light : Which lists of different types of electromagnetic radiation is correctly ordered in wavelength, from shortest to longest?
How do tables track the state and context of exchange packet : What are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?
Understanding of cryptography and its role to n/w security : Critical views on the advantages and disadvantages of technical solutions to security.
What amounts will be recorded for the machine : After your examination of the ?nancial statements and the acquisition agreement. Assuming a 30% tax rate, what amounts will be recorded for the machine, deferred tax liability, and goodwill?
Problem regarding the safe environmental practices : Chinese government investigators recently discovered that Fountain Set has contaminated a local river by dumping dye waste into it. What responsibility do U.S. companies have to ensure safe environmental practices?
Is the variance favorable or unfavorable : Analyze laundry costs for the month of September using the procedures for calculating a controllable overhead variance, Is the variance favorable or unfavorable?
Law of business organisations : Law of Business Organisations - Register a Proprietary Limited Company. You should refer to Section 117 of the Corporations Act, complete an application form ,Form 201, and prepare all relevant consents.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Find the checksum at the sender site

This problem shows a special case in checksum handling. A sender has two data items to send: Ox4567 and OxBA98. What is the value of the checksum?

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  How the user master record in sap plays an important role

Discuss how the user master record in SAP plays an important role in ensuring assignment of appropriate rights, activity groups / roles and authorisations for individual users.

  What is the significance of nevis island

What is the significance of Nevis Island and what is the significance of Stella's message to Fiona asking for interest rates?

  Overview of information security fundamentals

This assessment task is based on the following topics discussed in the subject: the overview of Information security fundamentals, security threats, cryptography, malicious software and its countermeasures, operating system security and software ..

  Recall that a computer virus is malware

Recall that a computer virus is malware that relies on someone or something (other than itself) to propagate from one system to another. Write a computer virus that can be written to other empty text documents by running the batch program.

  Telling private industry how to set up or improve security?

justify telling private industry how to set up or improve their cybersecurity?

  Computer security models

Use the Internet to research the following computer security models: Biba (Biba Integrity Model), Give a brief synopsis of each model in your own words. Please cite any references that you use to complete this assignment

  Operations of an atm machine

Simulate the operations of an ATM machine. First, the customer is prompted to enter his personal identification number pin (for this case study, we test only if this pin is formed by 4 digits, otherwise a message like "Invalid PIN, try again..." w..

  For this application you will determine how your computer

for this application you will determine how your computer is connected through a network. you do not have to actually

  Give the security levels top secret-secret and confidential

Give the security levels Top SECRET,SECRET,CONFIDENTIAL, and UNCLASSIFIED (order from highest to lowest), and catergories A, B,C, specify what type of access (read,write, both or neither) is allowed in each of the following situations .

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd