Analyse network traffic to identify potential vulnerabilitie

Assignment Help Other Subject
Reference no: EM132488367 , Length: word count:3000

CTEC5801 - Foundation of Cyber Security - De Montfort University

Combined Coursework

Learning Outcomes

Learning Outcome 1: Create a new or modify an existing C program in order to complete a given specification
Learning Outcome 2: Explain and demonstrate understanding of an operating system's persistent storage
Learning Outcome 3: Evaluate and justify the use of cryptographic tools and techniques in an application context
Learning Outcome 4: Critically analyse network traffic to identify potential vulnerabilities
Learning Outcome 5: Relate knowledge of topics to cyber security domain

Task 1. Write a C program to implement a Vigenère cipher. You may use whatever IDE you wish but the program must be compile with the standard gcc compiler. Your program should give the user the option to either encrypt or decrypt a message. The user should be prompted to enter the passphrase to be entered and the keyword to be used in the cipher. The output should be text printed to stdout. Comments should be used to explain the rationale behind the design of your code. You must also provide a critical analysis as to the robustness of the Vigenère cipher and provide a recommendation as to whether or not it would be it would be sufficient for use in communications between colleagues within a non-technical environment.

Task 2. In your role as an Information Security Specialist for Global Designs Limited, you have been tasked with creating a set of policies for secure data. The data stored by Global Designs Ltd has a useful lifetime of 1 year, after which it is deleted. This deletion is done simply using the delete functionality of the Operating System. You are required to determine if this is adequate to fully delete the data, if not provide potential ways to recover the data and recommendations for how the data could be securely destroyed. They have asked that the report contains an overview of how data is deleted and recovered at a level the non-technical staff can understand as well as a more technical explanation of the architectural differences between the two for the IT Department. You may include any images or other supporting material within a single appendix. The report should not exceed 1,500 words.

Task 3. In your role as a consultant for Data Storage Solutions, you have been tasked with providing a report into the current state of the art encrypted e-mail solutions. Identify if information can be extracted from e-mails if the network traffic has been intercepted. If it can, identify how the solutions you have assessed solve this problem. Different existing solutions should be considered, critically analysed and compared. Additionally, an overview of the current state of the art research in the field should be included. At the end of the report, clear guidelines should be included detailing when it would be most appropriate to use each solution covered in the main report.

Task 4. Download the pcap file CTEC5801_coursework.pcap and analyse the traffic. Identify, analyse and explain all connections and interactions you can identify. Assess whether or not any of the connections might be suspicious, identify these and explain why they might pose a danger. You must include:
- Start frame
- Mac address of host initiating the connection
- Mac address of destination host
- IP address of host initiating connection
- IP address of destination host
- The port used by the initialising host
- The port used by the destination host

Attachment:- Foundation of Cyber Security.rar

Reference no: EM132488367

Questions Cloud

Brief summary and analysis of the journal articles : Brief summary and analysis of the journal articles reviewed. The type of articles you will need to find is researcharticles located in scholarly journals.
Prepare the journal entries to record the restricted stock : Prepare the journal entry to account for this forfeiture. (Credit account titles are automatically indented when amount is entered. Do not indent manually.)
Prepare the entry to record the issuance of the bonds : Prepare the entry to record the issuance of the bonds and warrants. (Credit account titles are automatically indented when amount is entered)
What accumulated depreciations represents : If you have a fixed asset on books that has a book value of $100,000 and accumulated depreciation of $500,00 how much the asset originally cost?
Analyse network traffic to identify potential vulnerabilitie : Evaluate and justify the use of cryptographic tools and techniques in an application context and Critically analyse network traffic to identify potential
Compute annual depreciation for the first and second years : Compute annual depreciation for the first and second years using the straight-line method. (Round answers to 0 decimal places, e.g. 125.)
What was campbell soup return on assets : Net sales of $7,586 million, and net income of $736 million. What was Campbell Soup's return on assets? (Round answer to 1 decimal places, e.g. 17.5%.)
Find the pv of the firms stock price at the end of year : Find the PV of the firm's stock price at the end of Year 3. Shell is experiencing rapid growth. Earnings and dividends are expected to grow
Build strong companies by listening and involving staff : Senior Leaders can build strong companies by listening and involving staff in their decision making which in return would make the change management process

Reviews

Write a Review

Other Subject Questions & Answers

  Can the agile method be used on a traditional project

The traditional schedule can work for an agile project if the customer does not change his/her mind too often. This will allow for a more rigid schedule.

  What did the attorney do that was bad

Do you agree with the Kentucky Supreme Court's affirmation of a criminal contempt conviction of the attorney in the case of Poindexter v. Commonwealth.

  Which stage is affected by the level of caregiver control

which stage is affected by the level of caregiver control? Which stage discusses feelings of inadequacy and failure?

  What are the pros of governmental regulation of health care

Discussion Question- What are the pros and cons of governmental regulation of health care products and services to the consumer?

  What tax sources would you use to research the problem

The current tax law system in the United States has emerged over many years from statutory, administrative, and judicial sources.

  Explanation of the health issues and risks

Consider the following examples of pediatric patients and their families: ?Overweight 5-year-old boy with overweight parents, Example 1: Overweight 5-year-old boy with overweight parents. Post one1 to 2 page discussion paper on : An explanation of..

  Implication of social media in the community

What is the potential for social psychologists to understand and inform the implication of social media in the community and the broader social context? Why

  Question 1 either find a newspaper tv radio or web

question 1. either find a newspaper tv radio or web article that reports some scientific study or statistical

  Discuss about the case given below

Bob is the CEO for "Freedom Enterprises," a financial services conglomerate with over 10 billion in assets. Among Freedom's primary businesses are banking, health insurance and property and casualty insurance. Bob comes to your office seeking coun..

  Describe the steps to reconstruct a case

Describe how reconstructing a crime scene can aid in understanding the fundamentals of criminal investigations.

  Typical memory issues-theories of learning

We all seem to want a good memory. (What are my co-workers names? Where did I leave my computer? What day was I supposed to submit that proposal to my boss?) might be typical memory issues. After reading about memory, what is your most valuable tip f..

  What types of assets might a small business have

What types of assets might a small business have? What types of debts (liabilities) might a small business have? What does a current ratio measure, and how do you calculate it?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd