CIS4017-N System Administration and Security Assignment

Assignment Help Other Subject
Reference no: EM132501108

CIS4017-N System Administration and Security Assignment - Teesside University, UK

Assignment Title - Cryptography basics, security analysis, design and implementation

Part I - Cryptography basics

RSA

1. Assume a public key for RSA encryption given by the pair (143,11). Find the private key corresponding to this pair.

2. Using the pair (143, 11), decode the encrypted message (111 4 88 57 116 67) assuming the letters were represented by ASCII values (recall that the ASCII values are 65->A, 66->B, ... and 97->a, 98->b, ...)

Feige-Fiat-Shamir scheme

3. Describe in detail the simplified Feige-Fiat-Shamir accreditation scheme between Peggy and Victor?

4. Consider the simplified Feige-Fiat-Shamir scheme with parameters n=15 and r=11. Trace with these values the contents of all the messages that Peggy and Victor will send/receive.

Diffie-Hellman protocol

5. Describe in detail the Diffie-Hellman protocol for three parties Alice, Bob and Carol.

Part II - Security analysis and design

Scenario I - Security models

Your tasks: You should produce a short report (around 500 words) to formalise a Bell Lapadula model to address the confidentiality properties for the specified scenario, and to discuss the strength and weakness of your model.

Scenario II - Security Analysis and Solutions to Conference Management Systems

Your tasks: You are asked to produce a report (1500-2000words) to provide contemplate descriptions of the above Web-based Conference Management System and identify the following:

1. Assets and security properties: what objects should be protected, what security properties might we expect the system to enforce? For each such security property, label it with one of: confidentiality, integrity, or availability?

2. Vulnerability: explain the vulnerability in the system and use an attack tree/model to describe how an attack could be mounted. Restrict your consideration to the threat model provided.

3. Protection: explain what cost-effective protections are available against the threats that you identify. Remember the focus is on software vulnerabilities.

Scenario III- Design and Implementation of a Secure Server Network

Your tasks: You should write a report with the appropriate details (2500 words max, but flexible) documenting all that you have done including how the servers are setup, how they are tested and how the attacks are done to them along with countermeasures. Use the tasks below as a guideline to write.

1. Using the Virtual Machines, configure ANYONE server namely Windows2008/2012 or Ubuntu(or other Linux servers), with the following: (i) DNS server (ii) DHCP server (iii) web server. Use a client computer to test the three servers to see if it works properly. Capture the appropriate screen shots or illustrate that through commands and output screens. Draw a simple network or workflow diagram of your network.

Hints:

DNS Server: Show that the smithlogistics.com (or similar) domain name is configured and that the clients could join it. Create some users and login in to the domain. Test what was implemented.

DHCP Server: Show the dynamic IP address assignment with an address pool along with evidence of clients receiving dynamic IP.

Web server: Configure IIS and Apache with web address www.smithlogistics.com (or similar) can be accessed from the web client. Test the web server with a sample webpage being accessed from the client. Install an SSL certificate to make it secure.

2. Implement at least four security attacks on the servers through Kali Linux or other independent tools and suggest countermeasures to stop them. Illustrate the attacks through commands or using GUI tools. Capture the attacks through screen shots or graphs or tables.

3. Show the detailed cost of implementing your solution, in a table format. You can try to show two different costs for the company to choose from.

Hints: Research on the costs of servers (hardware and software), switches, workstations, cables, etc.

4. Show all references used in the report, using appropriate referencing.

Attachment:- System Administration and Security Assignment File.rar

Reference no: EM132501108

Questions Cloud

SEV301 Water Engineering Design Assignment : SEV301 Water Engineering Design Assignment help and Solution, Deakin University - Assessment Writing Service - Demonstrate a thorough understanding of water
HRM101 Human Resource Management Assignment : HRM101 Human Resource Management Assignment Help and Solution - Emirates College of Technology, UAE. Discuss way enhances the employees' satisfaction
Did you include transitional words and phrases : Did you include transitional words and phrases? Did you check for nominalizations? Passive Voice? Faulty Predications? Subject / Verb Agreements?
What are the gendered expectations shown in the film : Nicholas Kristof and Sheryl Wu Dunn wrote a bestselling and Pulitzer Prize winning book, Half the Sky. It was made into a documentary just this year.
CIS4017-N System Administration and Security Assignment : CIS4017-N System Administration and Security Assignment Help and Solution - Teesside University, UK. Part II - Security analysis and design
What is the maximum dollar amount : Describe the essential differences between the following deposit pricing methods in use today: cost-plus pricing, andconditional pricing
Write an executive summary of the proposal : Of the three programs that you have proposed, choose the one that you wish to present. In 250-500 words, write an executive summary of that proposal.
BAF 421 Commercial Banking Management Assignment : BAF 421 Commercial Banking Management Assignment help and Solution, Emirates College of Technology - Assessment Writing Service
What tips can you take from the case study : What tips can you take from the case study and the Reading to improve your team leadership skills? How case study add to or change your thoughts on leadership

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd