CO4610 Foundations of Cybersecurity Concepts Assignment

Assignment Help Computer Network Security
Reference no: EM132473655 , Length: word count:2000

CO4610 Foundations of Cybersecurity Concepts - University of Chester

LO1: Show clear understanding of key cybersecurity terminologies.

LO2: Discuss common technical weaknesses and security measures.

LO3: Demonstrate a conceptual understanding of threats and resolutions with respect to Information and System Security.

LO4: Demonstrate understanding of knowledge, and a critical awareness of cybersecurity core concepts and techniques.

Section 1: Speaking

In 2016, a group of hackers known as the Hacking Team got hacked by a self-described black hat hacker. The hacker subsequently dumped their findings and also explained how the hack happened. It was alleged that "Hacking Team was a company that helped governments hack and spy on journalists, activists, political opposition, and other threats to their power". Read about ‘How Hacking Team got hacked' and address the following:

Question 1. Briefly summarise what happened. Find out what you can on the actors, including the attacker and the target(s), and possible motivations.

Question 2. Identify and explain at least three cybersecurity terminologies from (A) above. Where the term was used, define the term, describe in what context it was used, and give some details. E.g., if "attack vector" is mentioned, then what is ‘attack vector', what was the attack vector used and what did it achieve?

It is expected that you will use published materials like online articles, books, journals, conference papers, news articles etc. and these should be properly referenced. You may want to start from here and here.

Section 2: Auditing

This is the second Section that makes up the Portfolio of CO4610.

Question 1. Briefly explain the use of Windows Registry and demonstrate how the registry can be analysed using RegShot.

Your discussion should show understanding of regedit and the structure of the registry. For the demonstration, you are required to do the following:
i. Install RegShot on a Windows machine. You are strongly advised to use a virtual machine (VM) as you may not be able to undo any registry changes you make. You can use a university provided VM or one on your personal PC.
ii. Take a snapshot of the system's registry.
iii. Perform some system changes or install a new software. That is, carry out any activity that will cause some registry entries.
iv. Take a second snapshot of the registry. This must be done after (iii) above.
v. Compare the two snapshots and briefly discuss your findings. Use screenshots to document this Section.

Question 2. On a Linux VM, create a log file in /var/log with your J number (e.g., J12345.log) that collects all security related logs. Set logrotate to rotate all logs, including the new log, every hour. Compress the rotated new log and change its permission to 0700. Document and discuss the process you have taken using some screenshots.

Section 3: Python

Alice and Bob need to individually and separately generate the same encryption (secret) key to allow them to securely exchange a message (read about Diffie-Hellman key exchange). To do this, in this case, they both need two public numbers (p = 353 and ?? = 3). Alice calculates an individual public key (YA = 40) and sends it to Bob. Bob calculates an individual public key (YB = 248) and sends it to Alice. To generate the secret key (K), Alice and Bob would need their individual private keys (XA and XB respectively) and the individual public keys they received.

The relevant equations are:
YA = ∝XA mod p
YB = ∝XB mod p
KA = YBXA mod p OR KB = YAXB mod p

Write a python script that will crack (brute force) the values of XA and XB and use them to generate the secret key (K). You must comment your code and explain the steps. Deliverables include commented code and screenshots showing the values (XA, XB and K) generated by the code.

Section 4: Security and Cryptography

Question 1. What is Frequency Analysis?

Question 2. Using Frequency Analysis technique, cryptanalyse the following ciphertext:

"dfi du cei tpwr du rdnsafm pf ifqkwxcig oirrpmi, au cei npfmvpmi du cei xnpafcizc ar lfdtf, ar cd uafg p gauuikifc xnpafcizc du cei rpoi npfmvpmi ndfm ifdvme cd uann dfi reiic dk rd, pfg ceif ti qdvfc cei dqqvkkifqir du ipqe niccik. Ti fdci pfg qpnn cei odrc ukijvifcnw dqqvkkafm niccik cei ‘uakrc', cei fizc odrc dqqvkkafm niccik cei ‘riqdfg' cei udnndtafm odrc dqqvkkafm niccik cei ‘ceakg', pfg rd df, vfcan ti pqqdvfc udk pnn cei gauuikifc niccikr af cei xnpafcizc rpoxni. Ceif ti nddl pc cei qaxeik cizc ti tpfc cd rdnsi pfg ti pnrd qnprrauw acr rwohdnr. Ti uafg cei odrc dqqvkkafm rwohdn pfg qepfmi ac cd cei udko du cei ‘uakrc' niccik du cei xnpafcizc rpoxni, cei fizc odrc qdoodf rwohdn ar qepfmig cd cei udko du cei ‘riqdfg' niccik, pfg cei udnndtafm odrc qdoodf rwohdn ar qepfmig cd cei udko du cei ‘ceakg' niccik, pfg rd df, vfcan ti pqqdvfc udk pnn rwohdnr du cei qkwxcdmkpo ti tpfc cd rdnsi"

Section 5: Critical review and Conclusion

This is the fifth and final Section that makes up the Portfolio of CO4610.

Based on the previous 4 Sections, critically review and conclude the portfolio. The discussion here should address the following questions:

Question 1. What is the one new thing you have learnt?

Question 2. What is the most challenging Section for you and why?

Question 3. What can you do differently next time?

This is a free-form portion of the portfolio that is intended to show the student's reflection on process, demonstrating learning, awareness of strengths and weaknesses and identification of possible areas for improvement.

2000-word report

Reference no: EM132473655

Questions Cloud

How satisfied each customer is with the current performance : Identify any internal and external customers that this situation affects. Evaluate how satisfied each customer is with the current performance.
Can corporations-especially large ones-be innovative : Is the term corporate entrepreneurship an oxymoron? In other words, can corporations-especially large ones-be innovative? Support your answer with examples.
What diversity and inclusion means to you : Write free form (min. 200 words) on what ‘diversity and inclusion' means to you. Articulate what you consider to be the responsibilities for diversity.
Identify management response strategies for the risks : Identify risks and categorize each risk. Note: The categorization is up to you, but you might include such considerations as external risks.
CO4610 Foundations of Cybersecurity Concepts Assignment : CO4610 Foundations of Cybersecurity Concepts Assignment Help and Solution, University of Chester - Assessment Writing Service
Prepare current assets section of the balance sheet : Prepare current assets section of the balance sheet. Ending balances needed are as follows: Cash, $13,500; Accounts Receivable, $165,000
How the equipment purchased would be recorded at : How The equipment purchased would be recorded at? Purchase price of equipment$25,000Freight costs1,800Installation costs1,100Damage during installing600.
Explain a typical process for developing an operational plan : Explain a typical process for developing an operational plan and Discuss the concept of a balanced scorecard as an alternative approach to measuring business
How will the note be represented on the balance sheet : The first payment is made on October 1. Determine and How will the note be represented on the balance sheet for December 31?.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd