Explore pretty good privacy encryption program

Assignment Help Other Subject
Reference no: EM132116851

Assignment Description

The purpose of this assignment is twofold -

Task 1: In Task 1, students will explore Pretty Good Privacy (PGP) encryption program that provides asymmetric cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.

Task 2: To develop skills to independently think of a situation and apply skills to analyze complex problems in network security under supervision. In this task, students will analyze a recent case in a chosen field. Based on his/her analysis, the student will find out the causes of the breach and will provide a plausible theoretical solution to resolve the case.

Task 1: Pretty Good Privacy (PGP)

Description of the assessment:

This task needs to be completed using the iGolder PGP Freeware tool. A text file with the public key is provided in the assessment folder. Use this key to encrypt the following plain text that can only be decrypted by your tutor, who has the corresponding private key.

Task 2: Critical Thinking

Description of the assessment:

This task consists of three steps - i) field selection ii) find a business case and iii) analyze the business case.

***You should work on your assignment progressively in full co-ordination with your tutor.

Field Selection
In the first step of the assignment, you have to select one of the fields listed below. You should choose your field in consultation with your lab tutor -
- Software Defined Networking
- Internet of Things
- Cloud Network
- Wireless Sensor Network

Finding a Case Study
In this step, you need to find a business case in your chosen field from last two years. The business

case can be of two types -
- A real world example, where a security breach occurs in your chosen field.
- One IEEE Journal, where authors worked toward the security of your chosen field.
Analyzing the Business Case
Analysis depends on the type of your business case -
A Real World Example
If it is a real world example, you need to first write a summary of the case study in your own words. Then you need to clearly identify the security breaches that occurred. Finally, you have to provide a solution that should be taken in future by the respective organization to build a shield against such attacks.

Research Article
You need to write a critical review of the journal that you have identified. The critical review includes - i) Summary of the Paper ii) Strength of the Paper iii) Weakness of the paper.

Task 2 Report Writing Guideline
1. Please download the IEEE Conference Template from the VU Collaborate
2. You need to use the template to write your report
3. The report should be in between 2-3 pages.

Attachment:- Assignment.rar

Reference no: EM132116851

Questions Cloud

Can she increase her economic profit by advertising : Bianca bakes delicious cookies. Her total fixed cost is $40 a day, and her average variable cost is $1 a bag. Few people know about Bianca's Cookies.
Job satisfaction is one of most positive forces : Job satisfaction is one of the most positive forces in an organization, especially when it is shared among members of a department or team.
Determine will average total cost increase or decrease : Bianca bakes delicious cookies. Her total fixed cost is $40 a day, and her average variable cost is $1 a bag. Few people know about Bianca's Cookies.
What effect will products competing with new apple iphone : What effect will products competing with the new Apple iPhone X have on consumer demand and are there any worries regarding supply issues?
Explore pretty good privacy encryption program : NIT5140 - Information Security - Victoria university - analyze a recent case in a chosen field. Based on his/her analysis, the student will find out the causes
Will she continue to sell her cookies : Bianca bakes delicious cookies. Her total fixed cost is $40 a day, and her average variable cost is $1 a bag. Few people know about Bianca's Cookies.
What is the mode in the set of scores : What is the mode in the following set of scores? 112, 111, 118, 120, 120, 102, 113
What could be improved about their social media presence : Look up your selected interest group on social media. What is good about their social media presence? What could be improved about their social media presence?
Terms of the confidence interval around : It all depends on you!" If the $525 is the mean, state what the following figures stand for in terms of the confidence interval around this mean.

Reviews

len2116851

9/19/2018 1:38:58 AM

Reference Skilful use of high quality, credible, relevant sources to develop ideas. Accurate citations and references using the appropriate style. All sources cited. Appropriate paraphrasing and use of direct quotes. Consistent use of high quality, credible, relevant sources to develop ideas that are relevant to the chosen field. Accurate citations and references using the appropriate style. All sources cited. Demonstrate an attempt to use credible and/or relevant sources to support ideas. citations and references and/or in referencing style well used. Most sources cited. Demonstrate an attempt to use sources to support ideas in the writing. complete and precise referencing. Sources are well and perfevtly used to support ideas. complete and precise refefencing.

len2116851

9/19/2018 1:38:53 AM

Analysis of the business case (possible theoretical framework to defend) or Strong demonstration of technical skill to generate and evaluate complex ideas and concepts at the Demonstration of technical skill to generate and evaluate complex ideas and concepts at the Inadequate demonstration of technical skill to generate and evaluate complex Weak demonstration of technical skill to generate and evaluate complex ideas and concepts at the .Proper demonstration of technical skill to generate and evaluate complex done journal article (strength and/or weakness) abstract level. Clear identification of strength or weakness of the article or strong theoretical framework of defence for business case underpinned by the appropriate technical knowledge. abstract level. Identification of strength or weakness of the article or theoretical framework of defence for business case underpinned by the appropriate technical knowledge. ideas and concepts at the abstract level. proper identification of strength or weakness of the article or theoretical framework of defence for business case underpinned by the appropriate technical knowledge.

len2116851

9/19/2018 1:38:38 AM

Critical Review of Business Case/Journal article The business case/journal article is reviewed critically reflecting the technical and cognitive skills. Use of appropriate knowledge gained from the units and draw a clear map. The business case/journal article is reviewed critically. Adequate use of technical and cognitive skill. adequate demonstration of mapping the appropriate knowledge gained from the units. The business case/journal article is reviewed critically. adequate use of technical and cognitive skill. Demonstration of mapping the appropriate knowledge gained from the units is completed The business case/journal article is reviewed. Technical and cognitive skill is proper.nicley draw context based on the knowledge gained from the unit content Perfectl written. properly examined the article or business case critically.

len2116851

9/19/2018 1:38:33 AM

Literature Reflect the cognitive, technical and creative skills to investigate, analyse and synthesise the chosen field with appropriate illustration. Skilful use of high quality, credible, relevant sources to develop ideas. Use of cognitive and technical skills to investigate, analyse and synthesise the chosen field with appropriate illustration. Use of relevant resources to develop ideas. Good innovation power used and sources are of very high quality. Investigate, analyse and synthesise the chosen field with appropriate illustration. Lots of innovation and resources used to underpin the literature. Investigate, analyse and synthesise the chosen field with appropriate illustration. Lots of innovation and resources used to underpin the literature. Long and explained & relevance to the topic. Good references or Proper references.

len2116851

9/19/2018 1:38:29 AM

Criteria HD (80-100%) D (70-79%) C (60-69%) P (50 – 59%) N (40 – 49%) Abstract Highly appropriate, innovative and excellently written. Background, aim and results are articulated concisely and clearly. Highly relevant and proportion to each other. Appropriate and well written with relevant background, aim, results and conclusion, in proportion to each other. Well written with relevant background, aim, results and conclusion, in proportion to each other. Background, aim, results are articulated but the different parts of the abstract is not in well proportion to each other. Failed to brief the background, aims and results and either too long or too short.

len2116851

9/19/2018 1:38:21 AM

Task 1: Marking Criteria Criteria Description of the section Marks Plain Text Retrieval Tutor will try retrieve the plain text from the submitted cipher text. 10 Task 2: Marking Criteria Section to be included in the report Description of the section Marks Abstract You should write a brief abstract that will provide a glimpse of your report 2 Literature You should write a brief literature survey on your chosen field. Your literature survey should be supported by at least 3-4 research articles 2 Business Case/Journal article In this section, you need to present the business case that you will analyze in this report 2 Analysis of the business case or journal article In this section, you should present your detailed analysis. 10 Conclusion Draw a conclusion. 2 Reference All references should be in IEEE style 2 Total 30

len2116851

9/19/2018 1:38:14 AM

The report is due at Week 11 Submission Guidelines: 1. You will upload two files – • Task 1 – A .txt file containing the cipher text • Task 2 – A .pdf file, this will be checked through turnitin. Late submission of assignments will be penalised as follows: • For assignments 1 to 5 days late, a penalty of 10% (of total available marks) per day. • For assignments more than 5 days late, a penalty of 100% will apply. Marking criteria: Example of marking criteria is shown in following table. Marks are allocated as follows: Note: The marking criteria varies for each assignment

Write a Review

Other Subject Questions & Answers

  Individuals working in the field of psycholgy?

Why do you believe boundary issues are so difficult for individuals working in the field of psycholgy?

  Write a letter to the country prosecutor advising him

Reread the case file The Richfield Matter at the beginning of Chapter 2. Assume that you work for Attorney Michael Bate who is handling the Richfield matter.

  Discuss about the constant care

Discuss about the Constant care and supervision of a child with a disability.

  Concept of the city ought to be saved

Do you think the concept of the city ought to be saved? Why not just spread out, without the centralized functions of the city? What advantages does the city alone have? What still gives glamour to such cities as Florence, Venice, Rome, Paris, Vie..

  If the neutron star''s density is more than that of a neutron

If the neutron star's density is more than that of a neutron, the neutrons within the star are overlapping; if it is less, the neutrons are not overlapping. Which of these seems to be the case for average neutrons within the star?

  Advantages and disadvantages of electronic communication

Discuss the advantages and disadvantages of electronic communication in one specific situation. Make sure you identify the situation.

  Physically possible future

Given the laws of nature and a set of initial conditions, there is exactly one physically possible future.

  In which areas do you think the courts have gone too far

Have the courts provided adequate protection to citizens against overzealous police officers In which areas of search and seizure and interrogation law do you think the courts have not gone far enough In which areas do you think the courts have ..

  Find any two candidate keys of r

Given R(A, B, C, D, E) with the set of FDs, F{AB → CD, ABC → E, C → A}, Find any two candidate keys of R

  Covenantal fidelity

____shows Torah loyalists being skinned and fried in skillets precisely because of (and in spite of) their covenantal fidelity.

  How an international logistics company deals

Please discuss the issues involved in how an international logistics company deals with trade restrictions. Make full use of sources.

  Police and law enforcement

Create a 12- to 15-slide Microsoft® PowerPoint® presentation, with speaker notes, on the police and law enforcement. Include the following in your presentation:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd