Critically analyse network traffic

Assignment Help Computer Engineering
Reference no: EM132486779 , Length: word count:3000

CTEC5801 - Foundation of Cyber Security - De Montfort University

Combined Coursework

Learning Outcomes

Learning Outcome 1: Create a new or modify an existing C program in order to complete a given specification
Learning Outcome 2: Explain and demonstrate understanding of an operating system's persistent storage
Learning Outcome 3: Evaluate and justify the use of cryptographic tools and techniques in an application context
Learning Outcome 4: Critically analyse network traffic to identify potential vulnerabilities
Learning Outcome 5: Relate knowledge of topics to cyber security domain

Task 1. Write a C program to implement a Vigenère cipher. You may use whatever IDE you wish but the program must be compile with the standard gcc compiler. Your program should give the user the option to either encrypt or decrypt a message. The user should be prompted to enter the passphrase to be entered and the keyword to be used in the cipher. The output should be text printed to stdout. Comments should be used to explain the rationale behind the design of your code. You must also provide a critical analysis as to the robustness of the Vigenère cipher and provide a recommendation as to whether or not it would be it would be sufficient for use in communications between colleagues within a non-technical environment.

Task 2. In your role as an Information Security Specialist for Global Designs Limited, you have been tasked with creating a set of policies for secure data. The data stored by Global Designs Ltd has a useful lifetime of 1 year, after which it is deleted. This deletion is done simply using the delete functionality of the Operating System. You are required to determine if this is adequate to fully delete the data, if not provide potential ways to recover the data and recommendations for how the data could be securely destroyed. They have asked that the report contains an overview of how data is deleted and recovered at a level the non-technical staff can understand as well as a more technical explanation of the architectural differences between the two for the IT Department. You may include any images or other supporting material within a single appendix. The report should not exceed 1,500 words.

Task 3. In your role as a consultant for Data Storage Solutions, you have been tasked with providing a report into the current state of the art encrypted e-mail solutions. Identify if information can be extracted from e-mails if the network traffic has been intercepted. If it can, identify how the solutions you have assessed solve this problem. Different existing solutions should be considered, critically analysed and compared. Additionally, an overview of the current state of the art research in the field should be included. At the end of the report, clear guidelines should be included detailing when it would be most appropriate to use each solution covered in the main report.

Task 4. Download the pcap file CTEC5801_coursework.pcap and analyse the traffic. Identify, analyse and explain all connections and interactions you can identify. Assess whether or not any of the connections might be suspicious, identify these and explain why they might pose a danger. You must include:
- Start frame
- Mac address of host initiating the connection
- Mac address of destination host
- IP address of host initiating connection
- IP address of destination host
- The port used by the initialising host
- The port used by the destination host

Attachment:- Foundation of Cyber Security.rar

Reference no: EM132486779

Questions Cloud

Implementation and evaluation of penetration testing tools : Implement and evaluate security testing tools in a realistic computing environment and evaluate and applies contemporary intelligent cyber security solutions
Was a good idea for the soviets : Do they both make valid points? Was it a good idea for the US to negotiate arms reductions treaties with the Soviets? Was it a good idea for the Soviets?
Probability that the daughter children will develop disease : What is the probability that the daughter's children will develop the disease? Describe how you determined the probability.
Discuss spend time thinking about own priorities : Which of these issues seems most important to you? Which would you like to know more about? What makes some topics more relevant to the 21st century
Critically analyse network traffic : Explain and demonstrate understanding of an operating system's persistent storage and Critically analyse network traffic to identify potential vulnerabilities
List three organs that can reasonable affect starling forces : List three organs that can reasonable affect the starling forces as discussed above and describe how each organ listed affects that changes in fluid movement
Outline the meaning of the profit planning : Topic - Budgets. Outline the meaning of the profit planning or strategic budgeting process. What are the objectives of participative budgeting
Determine how wasteful are habits : Determine How wasteful are your habits? Consider ISWM best practices-waste prevention, recycling and composting, and disposal.
What is genotype and phenotype ratio : What is genotype and phenotype ratio with prediction of the offspring

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss risks to the companys information system

make a chart to show all potential risks to the company's information system including from inside or outside the system

  Report the total payments by date when the total payments

Report the total payments by date when the total payments are greater than $20,000. Which orders have a value greater than $5,000?

  Examine a list of test scores stored in memory

Write an MC68000 program that will examine a list of test scores stored in memory.

  Why data mining has become important in today business world

Explain why data mining has become so important in today's business world. In the above article, the authors listed application areas of data mining.

  Write a function that creates a semi-circular wave

Write a function that creates a semi-circular wave. Follow a format for arguments similar to the square Wave. How similar is the sound to the sine wave?

  Write down an applet that reads in the size of the side

Write down an applet that reads in the size of the side of a square and displays a hollow square of that size out of asterisks, by using the drawString method inside your applet's paint method. Use an input dialog to read the size from the user. Y..

  Animate the motion of the system with given conditions

Write a Python program (or Jypiter notebook) to animate the motion of the system with given conditions.

  Would getting faster ethernet card help speed up the network

Suppose your network is using the stop and wait protocol and it is really providing a slow service. You calculate the Utilization and it is 95.75%.

  Define the cache and virtual memories

A processor has a direct addressing range of 64 KB. Show two schematics to extend the address range to 512 KB.

  How is a process created

How is a process created? Mention briefly the role of the fork and exec system calls in process creation.

  What choice do you recommend for marcus weber

Given that Marcus's budget will permit him to add only Barry or Kim to this project team, but not both, what choice do you recommend for him? Justify your answer.

  Write a computer program that prints a string of zeros

Write a computer program that prints a string of zeros and ones that represent the bits of an integer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd