Briefly describe the technologies

Assignment Help Computer Network Security
Reference no: EM132199676

Assignment Scenario

A major cloud computing company has asked you to assess two similar technologies, from a big-picture view (without too much technical detail), to help them decide which alteranative they should use.

The general idea is for your report to:

1. Briefly describe the two technologies.

2. Compare and contrast the two technologies: what are their good points and (more interestingly) their bad points or weaknesses.

3. Finally, what is your personal recommendation of which should a data-oriented company use? Explain why, perhaps by comparing their good points and bad points. If all options seem bad, feel free to recommend "none of the above".

Any two similar technologies would be fine, below are some possible topics:

A Few Possible Topics

1. To stop spam email,should we use:
- a Bayesian spam filter on the email server, or instead
- email address authentication?

2. VPN encryption: should we use:
- IPSec or
- TLS/SSL or
- One of the less popular protocols such as Cisco's AnyConnect (which uses Datagram Transport Layer Security (DTLS)) or Microsoft Point-to-Point Encryption (MPPE)?

3. What is the difference (if any) between the:
- Deep web (which usually means any web sites not indexed by search engines).
- Dark web (which usually means web sites doing criminal stuff).
Is one a subset of the other, or are they different but overlapping, or what?

4. Encryption key management: should we use
- A certificate authority for an SSL/TLS key and certificate (like a web site uses), or
- Our own key server for our company, something like Kerberos protocol.

5. How to send large binary files to a colleague, in a secure way? Should I use:
- Email attachments in MIME (given that email is not perfectly secure), or
- One-click hosting (also called a cyberlocker), such as www.mega.nzor similar?

6. On the subject of cyberlocker web sites, which one do you think is best? Take into account reviews of speed, is end-to-end encryption available, is it free, does the U.S. government read your files, and so on. Remember that our data company would value security above all else, so CALEA becomes very relevant, and end-to-end encryption would also be very nice.

7. My company spies on other people. Which do you recommend a spy to use:
- A hardware keylogger, perhaps with WiFi to you never have to get it back, or
- Some malware that tries to read the victim's hard drive.

8. Undeniable signatures are where someone cannot deny that they sent a message. There are several ways to do this, so describe two ways, and recommend what you think seems the best.

9. Encrypted, blockchain-based cryptocurrencies are popular today. What is the difference (if any) between:
- Bitcoin, and
- Etherium (or any other cryptocurrency that isn't Bitcoin, such as Zcash).
If all cryptocurrencies seem bad to you, feel free to recommend not to use any.

10. In the United States, they have a law called the Communications Assistance for Law Enforcement Act (CALEA). It requires companies that have computer networks (including Skype, Hotmail, Gmail, and all U.S. universities) to allow the U.S. Government to easily tap in to the private data of customers for real-time surveillance. This includes your emails, your Skype conversations, and so forth.

To prevent the U.S. Government from listening to your communications, should we use:
- Open-source substitutes for Skype with strong encryption, such as LinPhone, Tox, SureSpot, ChatSecure, or RedPhone, or instead:
- Some other commercial alternative, such as WeChat.

11. Cryptographic hash functions are a basic technology used in many encryption methods. Some hash functions are:
- Older but popular ones like MD5 and SHA-1
- Newer ones that are supposed to be better, like BLAKE2, SHA-3, and Tiger.
Is newer really better? Or are the older generation still okay

Verified Expert

" This is a report on the topic, "To stop spam email, should we use: a Bayesian spam filter on the email server, or instead email address authentication? The report contains information about two of the technologies, the problems related to spam and how the technologies can be used to stop spam.Based on the comparative discussion presented on the report, there is a recommendation section to understand how to use two of the technologies in the given scenario to stop spam."

Reference no: EM132199676

Questions Cloud

How will your communication strategies change for each group : Describe one internal and one external method for the dissemination of your EBP project results. For example, an internal method may be the hospital board.
Conduct a deep dive research session into subject company : Research is based upon the ability to focus on the appropriate problem and adequately defining it, not what is necessarily the surface issue.
Discuss the process of debt accumulation : Loans and Debt. Discuss the process of debt accumulation in poor countries, ie, how loans are granted, fall behind in payment, and eventually
What is the market price of the bond : There is an 8%, 25 year bond which was issued 5 years ago. If the market rates of interest are 2%, what is the market price of the bond
Briefly describe the technologies : Research Report - Compare and contrast the two technologies: what are their good points and (more interestingly) their bad points or weaknesses
Derive the marginal revenue curve for the firm : The David Company's demand curve for the company's product is P = 2,000 - 20Q, where P = price and Q = the number sold per month.
Land available to raise apples and beets : A farmer has 150 acres of land available to raise apples and beets.
Price elasticity of demand : The demand curve is Qd = 200 - ¼ P. Calculate the (point) price elasticity of demand when price is $24. Is demand elastic or inelastic?
Determine the effectiveness of your change : In order to evaluate an evidence-based practice project, it is important to be able to determine the effectiveness of your change.

Reviews

len2199676

12/20/2018 10:02:46 PM

Note: This is not a group project. Each student must individually complete all parts of their submission. Students must start with a new document and they must not have another person’s file in their possession at any time. Students are welcome to discuss the task with each other (and with the lecturer), but each student must write their assignment independently and not show their work to other students.

Write a Review

Computer Network Security Questions & Answers

  Problems related to e commerce

Question 1: What are some elements of securing online transactions? Question 2: What are some elements of administering an e-commerce site?

  How can the article apply to organizations

How can the article be applied in your day-to-day activities regarding information security? How can the article apply to organizations, not just individuals?

  Describe the major components of secure data transmission

Describe the major components of secure data transmission. Discuss how cryptology works and the role of cryptology in secure data transmission.

  Write a paper about mobile security

Write a paper about mobile security. FIRST: Search using the library search or google scholar for a peer reviewed article using statistical analysis for a topic about mobile security that show some data and details.

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Design proposal completed in cmit

If you recall, this was the Network Design Proposal completed in CMIT 265. University realizes it needs to secure the faculty, students, and visitors network.

  Are suppliers liable for harm or loss incurred by purchasers

Are suppliers liable for harm or loss incurred by purchasers of cybersecurity products and services? (That is, does the risk transfer from seller to buyer?)

  Design a security plan that describes counter-measures

Design a security plan that describes counter-measures that will manage the threats that put the organisation's information holdings at risk and disaster recovery processes.

  Find the checksum at the sender site

This problem shows a special case in checksum handling. A sender has two data items to send: Ox4567 and OxBA98. What is the value of the checksum?

  Variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

  What you believe are largest threat against network security

Discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  Construct the routing tables at each of the nodes

Construct the routing tables at each of the five nodes - Write a function computeDijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predecessor vector.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd