What are the core components of a pki

Assignment Help Computer Network Security
Reference no: EM13835667

Task-1

Q1. An affine cipher scheme (or algorithm) is the form - C(x) → (αx+β) MOD 26, where x is the numerical equivalent of the given plaintext letter, and α and β are (appropriately chosen) integers. The numerical equivalents of the letters are as follows:

a  b  c  d  e  f  g  h   i   j   k   l  m  n  o  p  q  r  s  t  u   v   w   x   y  z
0   1   2   3   4   5   6  7   8   9   10   11   12   13   14   15   16   17   18   19   20   21   22   23   24   25 

a) Let α=5 and β=7, encrypt the message "Deakin School of IT"

Task-2

Q2 What are the core components of a PKI? Briefly describe each component.

Task-3

Q3. Explain the problems with key management and how it affects symmetric cryptography.

Task-4

Q4. Consider the following threats of Web security and describe how each is encountered by a particular feature of SSL.

a. Brute Force Cryptanalytic Attack an exhaustive search of the key space for a conventional encryption algorithms.

b. Man-in-Middle attack: An attacker interposes during key exchange, acting as client to the server and as the server to the client.

c. SYN Flooding: An attacker sends TCP SYN message to request connection but does not respond to the final message to establish the connection fully. The attack TCP module typically leaves the "half-open connection" around for a few minutes. Repeated SYN messages can clog the TCP module.

Task-5

Q5.What is port forwarding? What are the different types of port forwarding supported by SSH?

Task-6

Q6. In IEEE 802.11, open system authentication simply consist of two communications. An authentication is requested by the client, which contains station ID (typically MAC address). This followed by an authentication response from the AP/router containing a success or failure message. An example of when a failure may occur is if the client's MAC address is explicitly excluded in AP/router configuration.

a) What are the benefits of this authentication scheme?

Task-7

Q7. Assume you have found a USB memory stick in your work parking area. What threats might this pose to your work computer should you just plug the memory stick in and examine its contents? In particular, consider whether each of the malware propagation mechanism we study in chapter 10 of our text book could use such memory stick for transport. What steps could you take to mitigate these threats and safely determine the contents of the memory stick?

Task-8

Assume you receive an e-mail that appears to come from your bank, with your bank logo in it and with the following contents:

"Dear customer, our records show that your Internet Banking access has been blocked due to too many logging attempts with invalid information such as incorrect access number, password, or security number. We urge you to restore your account access immediately and avoid permanent closure of your account, by clicking on this link to restore your account. Thank you from your customer service team."

What form of attack is this e-mail attempting? What is the most likely mechanism used to distributed e-mail? How should respond to such e-mails?

Task-9

Q9.

Write a comprehensive report (800 - 1000 words) on the following topic:

a) Bug Bunty and its programme.

[In your report at least you should highlight the following points:
- What is bug bounty?
- What is the benefit for an IT company to join in bug bounty program?
- Why people participate in bug bounties?
- Will you plan to participate? If your answer is yes or no then explain.
- List (minimum ten) common targets of bug bounties.
- Name some sector/company so far not interested in bug bounty. Why they are not interested in joining Bug Bounty programme? Give reasonable answers. ]

Reference no: EM13835667

Questions Cloud

How are futures and options different in terms of the risks : How are futures and options different in terms of the risks they allow investors to protect against?
Responsible for monitoring and controlling strategic plans : responsible for monitoring and controlling strategic plans
Calculate the total return : a. Calculate the total return (including the capital gain and dividend yield) for the company stock over the last one year, five years and ten years.b. Calculate the return on comparable market index for the same periods. Did the stock outperform or ..
Write an analysis for profitability liquidity and financing : Write an analysis for each of the following: Profitability, Activity, Liquidity and Financing. Using the same Financial Statements of the company your group has chosen, determine the profitability, activity, liquidity and leverage using all the rat..
What are the core components of a pki : What are the core components of a PKI? Briefly describe each component - Explain the problems with key management and how it affects symmetric cryptography.
Should the coffee packaging project be accepted : Do you believe that there was sufficient financial information to make a solid decision on what to do? Was there further financial information that you required that was not provided to you? What financial figure do you believe was the determinant to..
Prepare a summary of the given article : Prepare a summary of the given article- Recently the franchise corporation owners of McDonald's voted to start serving breakfast all day throughout the 14, 339 restaurants it has in the US
What role do you play in the strategic planning process? : what role do you play in the strategic planning process?
What types of credit would work best for you : Calculate the revenue requirement (cost of service) and rate base of the utility from the information. Show your calculations. Write a response of no more than 700 words that answers the following questions: Given these calculations, what source of f..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Research paper on the privacy and on financial services

You need to work on the privacy and on financial services. For example Mint, Its an app also online access to keep track of your financial use in a month.

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

  What was the volume of digital evidence

Cybersecurity or Digital Forensics- Select a real world event related to Cybersecurity or Digital Forensics. What was the volume of digital evidence

  Genome4u is a scientific research project at a large

Genome4U is a scientific research project at a large university in the United States. Genome4U has recently started a large-scale project to sequence the genomes of 100,000 volunteers with a goal of creating a set of publicly accessible databases wit..

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  Analyze issue using social contract and rule utilitarianism

Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.

  Disaster-recovery processes and business-continuity planning

Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning.

  Reliable transmission of large volume data

Modern network applications require reliable transmission of large volume of data with bounded delay, between users and data-centres and between data-centres, potentially half way around the earth. What are the limitations in using distributed data c..

  Discuss the type of encryption

Identify the key reasons for selecting your wireless home router. Discuss the type of encryption it uses and explain the reason(s) why you believe this method of encryption is more superior than its contemporaries.

  Security management

Choose a topic from your major field of study. For example, if you pursuing a degree in education, your topic will come from the education field.

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  Identify the anomaly in the traffic organisation going

Identify the anomaly in the traffic this organisation is going through. What sort of evidence do you have to make this claim. What sort of utility or tool do you think the "attacker"is using to conduct this attack

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd