Implement secure encryption technologies

Assignment Help Other Subject
Reference no: EM133029934

ICTNWK502 Implement Secure Encryption Technologies

Purpose
This Assessment Tool assesses your ability to determine, Implement and monitor Encryption Methods.

Assessment Task-1

Question 1: Explain each of the following symmetric key algorithms in 50-100 and list at least two (2) usages for each of symmetric key algorithms.
1) AES
2) DES
3) Triple DES
4) Blowfish

Question 2: Explain each of the below mention encryption types in 80-150 words:
1. Public Key
2. Secret Key
3. Hash key

Question 3: Explain the functioning of "Digital signatures" in 100-150 words.

Question 4: Explain two (2) features of digital signatures. Write 100-150 for each function.

Question 5: Answer the below questions related to timestamp.
5A) Explain two (2) functions of timestamp. Explain each in 50-100 words. 5B) Summarize two features of timestamp.

Question 6: What do you understand by the term "Encryption strength"? Explain in 50-100 words.

Question 7: Explain each of following terms in 50-150 words.
1. Message digest 5 (MD5)
2. Secure hash algorithm (SHA)
3. Public key infrastructure (PKI)
4. Pretty good privacy (PGP)
5. GNU privacy guard (GnuPG)

Question 8: Explain the importance of reviewing helpdesk records to troubleshoot encryption issues. Explain in 40-80 words.

Question 9: What important information will you collect by reviewing system logs for encryption issues and compromises. Write your response un 50-100 words.

Question 10: Explain each the following security threat in 50-100 words.
1. Eavesdropping
2. Data Interception
3. Data corruption
4. Data falsification
5. Authentication issues.

Question 11: Explain the term "Transmission Control Protocol" and its application in 150-200 words.

Question 12: Explain the following terms. (Each in 50-150 words).
1. Wired Equivalent Privacy (WEP)
2. Wi-Fi Protected access (WPA)
3. Wi-Fi Protected access 2 (WPA2)

Question 13: Explain each of the following certificate related infrastructure in 50-150 words?
1) Certificate authorities
2) Registration authorities
3) Repository services

Question 14: List three (3) most common asymmetric key algorithms and summarise their usages in 40-80 words.

Question 15: What do you understand by reply attacks? Write your response in 100-150 words.

Question 16: List and explain five (5) security problems and challenges arise due to organisational issues?

Question 17: Summarise the features and functions of access control permission in 100-200 words.

Question 18: Explain the functioning and features of the following in 100-200 words for each.
1. Symmetrical Encryption
2. Asymmetrical Encryption

Question 19: Summarise the features and functions of "One-way encryption"?

Question 20: List two techniques to analyse data security requirements.

Question 21: What is the essential information should include in a security plan. List any three (3).

Assessment Task-2

Scenario:
"Southern Star" company is providing public, private, hybrid and community cloud services to many companies across the world and offering following services:

• IaaS (Infrastructure-as-a-Service)
• PaaS (Platform-as-a-Service)
• SaaS (Software-as-a-Service)
• Storage, Database, Information, Process, Application, Integration, Security, Management Testing-as-a-service
To provide above mentioned cloud services, "Southern Star" company has following infrastructure in
their data centre.
• Eight (8) Servers out of these Six (6) are connected to network and Two (2) are kept as backup.
• Twelve (12) Network switches with 24 port support (Nine (9) Switches are connected to network are three (3) are kept as back up)
• Six (6) Routers (4 Routers are hosing NBN connection and two (2) of them are kept as back up)
• Five (5) wireless access point connected to network to provide Wi-Fi connectivity throughout data centre.
• Twenty (20) SAN (Storage area network) storage area devices to store client's data.
• Fifty (50) desktop computers

"Shan Publications" is a premium client of "Southern Star". "Shan publication" use cloud services offered by "Southern Star" to store the drafts of unpublished poems, books and
blueprints of printed books. One day as they were downloading the drafts of some books to publish, they found that some of their data is missing from the server and raised the complaint about missing data to "Southern Star". As per the agreement "Southern Star" is liable for client data security and company do not want to lose their client base.
Southern Star is now investigating the problem, and one of the senior consultants (Lee) is allocated to this project. Lee is working in the company from last 10 years and has an extensive amount of experience in network, cloud and data security.
David is a general manager of the Southern star and looking after all the operation of the organisation.
Roles and responsibilities of Lee:

• Planning, implementing, and upgrading security measures and controls.
• Establishing plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction.
• Maintaining data and monitor security access.
• Performing vulnerability testing, risk analyses and security assessments
• Conducting internal and external security audits
• Anticipating security alerts, incidents and disasters and reduce their likelihood.
• Managing network, intrusion detection and prevention systems
• Analysing security breaches to determine their root cause.
• Recommending and install appropriate tools and countermeasures.
• Defining, implementing, and maintaining corporate security policies
• Training fellow employees in security awareness and procedures
• Coordinating security plans with outside vendors

After an initial investigation of the data loss problem, Lee has found below concerns in the southern star network infrastructure:
• No data encryption service
• Data security concerns
• Data permission not planned.
• Additional hardware to manage the data.

Activity 1: (Analysing and documenting data security requirement)
After reviewing the scenario, you need to analyse the data loss problem and need to prepare a security plan including.
• Background of the security plan
• Issues identified in the network
• How to resolve each issue
• What hardware and software required
• How identified software and hardware aligned with the solutions

• How and when data backup will be prepared
• Transmission security

• Network database security
You may need to research related to security plan on the internet. You must complete below security plan as a part of the activity.

Activity 2:

(Review encryption technologies and costs) Note: This activity is in continuation of activity 1.
After completing the security plan, you are required to review a range of encryption software on the internet and complete below Technology cost template.
After completing the template, you are required to send email to David (Trainer/assessor) including technology cost document for approval. Email must include:
• Subject
• Body
• Explain that which option is the best and why we should use it.

Assessment Task- 3

Project Task:

Activity 1(Installing encryption software)
This activity is continuation of assessment task 2. You are required to participate in a practical demonstration task. You need to complete this activity in 1 to 2 hours.
Note: For This activity RTO/Assessor will provide you the following:
• A site where encryption installation may be conducted
• A live network
• Servers
• Encryption software
• Encryption tools.

You have received a final approval from David to start the encryption project, so you must perform the installation of encryption software and tools on the live network.
Assume yourself as "Lee" and install database encryption software and tools.
You need to install encryption software on IT Server. You need to Perform installation of database
"Encryption" software by adhering below mention conditions.
a. Use secure protocol for data transfer
b. Create a digital key certificate for client and server
c. Use secure network protocols
d. Set admin password
Student must follow vendor instruction to install the software.
Your trainer and assessor will observe you during the activity and complete the performance checklist.

Activity 2: (Analysing effect of encryption on user roles) Note: This activity is in continuation of activity 1.
Assume that Lee has implemented the encryption software successfully. As a part of his responsibilities, he needs to analyse the effect of user roles and responsibilities.

Assume yourself as Lee and you are required to analyse the effect of user roles and responsibilities in encryption and complete the following template.

Activity 3: (Role Play - Informing users about their roles) Note: This activity is in continuation of activity 2.
o Time allowed for this activity is 10-15 minutes.
Assume that you are still playing the role of Lee and participate in the following role play.
The purpose of the role play is to inform users about new encryption technology and how it works. Explain the effects of new encryption technology on user responsibilities. You need to use the template that you have developed in the assessment activity 2 (Assessment task 3) to explain the effects of new encryption technology on user responsibilities for the following users:
o Policy administrator
o Enterprise Authenticator
o Policy authenticator
o User

Your trainer/assessor will act as enterprise administrator and will ask you the following questions:

1. Security limitations of all the roles

2. Explanation of the features included in the "Enterprise administrator" role Following the role play, complete minutes of meeting template with details of what was discussed.

Activity 4: (Analysing functioning of "Encryption software")

Assuming that you have implemented the encryption technology and tools in a live server in the previous assessment activities, you are required to monitor the encryption in this activity. You need to complete this task in 1 to 2 hours.
In this activity you need to monitor the functioning of "Encryption software" by perform following tasks in a live server.

1. Analyse the implementation of encryption technology to confirm its functioning by:
o Monitoring digital signature
o Monitoring Data Encryption Compromising Network Performance
o Monitoring network performance

2. Analyse helpdesk records for errors occurred and security compromises in encryption and print these records as a part of this activity.

3. Check local computer security logs for encryption issues and print it as a part of this activity.

4. You need write a note on encryption issue and security compromises included error logs and network performance issues identified in the task and submit to your trainer/assessor.

Attachment:- Implement Secure Encryption Technologies.rar

Reference no: EM133029934

Questions Cloud

What kinds of ethical issues have you faced : What kinds of ethical issues have you faced? How prepared are you to respond to them?
Biggest cost in running the business : Senior managers spend considerable time planning for the efficient use of equipment, materials and money towards achieving their business objectives. But they d
Sustainability in the hospitality industry : As a HRM student, please advise the management of City Hotel on what HR actions with supportive and relevant arguments they can take to ensure their sustainabil
Define the performance management : Define the performance management and consider two main components of the definition? Short Answer
Implement secure encryption technologies : Implement Secure Encryption Technologies - Explain the functioning of "Digital signatures" and What do you understand by the term "Encryption strength"
Find the location of its maximum in the closed rectangle : The purpose of this exercise is to show that the maximum principle is not true for the equation. Find the location of its maximum in the closed rectangle
Concept of individuals labelling : Use in-text citation and the References page for the following information: In-text citation:
Create a swot analysis for cvs : Create a SWOT analysis for CVS. Can someone please help me?
How can a recruiting and hiring system : How can a recruiting and hiring system be develop that would promotes diversity while also insuring the best possible hire?

Reviews

Write a Review

Other Subject Questions & Answers

  Assignment construction CAD and BIM

Assignment construction CAD and BIM - University of Derby - Transfer traditional drawing and detailing skills to the CAD environment and use CAD software

  Briefly explain what the term genre means

Briefly explain what the term "genre" means and identify the distinguishing features of the three main literary genres.

  Explain major differences between equity and debt financing

Explain the major differences between equity and debt financing, and discuss the primary ways in which each would affect the future of the partners' business.

  Explain fueled racial and political divisions in the country

For each of the following passages (a through f), state whether it does or does not contain an argument. If the passage does contain an argument, indicate the c

  Ethnocentrism and cultural relativism

In this assignment, we build upon the questions, "Who am I as an individual?" and "What are my group memberships?" Create a cultural picture of yourself by describing how your personal background has influenced who you are today. As you prepare fo..

  What are possible implications of inaccurate documentation

Discuss ways that the documentation of diagnosis, differential diagnoses, and comorbidities affect reimbursement. What are possible implications of inaccurate.

  Define ways leaders can meet the future ethical challenges

Write a paper (1,000-1,250 words) that addresses the ways leaders can meet the future ethical challenges of technology and diversity in organizations.

  What was the inspiration for your collage

Describe the characteristics of your collage. Where did you source your materials for your collage? What was the inspiration for your collage?

  Divinity of jesus and doctrine of trinity

What proof is there that supports that Jesus is God? I do not quite understand how the Trinity fits into this discussion. How do critics e.g., non-Christians react to the Doctrine of the Trinity? Provide evidence for your position.

  Describe how the disorder could affect memory

Describe how altered states of consciousness related to sleep, psychoactive drugs, or meditation and hypnosis affect individuals with the disorder. Describe how the disorder could affect memory.

  What are some of super concepts of career maturity

What are some of Super's concepts of Career maturity and what are some views of its importance to adolescent clients.

  Brief description of two neurological factors

Brief description of two neurological factors that may be related to criminal behavior. Then, describe what potential they each demonstrate for predicting criminal behavior and explain why, using specific examples

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd