Is security really all that important to you

Assignment Help Computer Network Security
Reference no: EM131001056

Objectives:

- Write a reflection
- Hash files to verify their authenticity
- Use the cloud-based Dropbox to share content

- Learn how to create an encrypted disk image (Mac) or an encrypted VHD (PC)

Note: We will be discussing many of the assignment details in class.

Tasks:

1. REFLECTION: Spend some time thinking about how you view computing security in a connected world. Is security really all that important to you? Do you feel vulnerable? Do you feel like you are doing enough to protect yourself? Are you thinking about ways of enhancing your security?

Is there too much hype with respect to various breaches in security? Do you have anything to hide? What are your thoughts? Write a 350 - 400 word reflection.

- Please name your file as follows: LastName_FirstName_Reflection2.

- Reflections are personal introspections. There are no right or wrong answers.

- There is nothing wrong with doing a little reading before writing a reflection if you choose to do so. Just keep in mind that the reflection ultimately consists of your perspective.

-Take the reflection where ever you please.

- The reflection is informal, but reasonable spelling and grammar is appreciated.

- doc, docx, or PDF format only. Please ensure your name, student number, course number, and assignment number are in the header.

2. Examine the nine text files located in the folder found at:

https://www.dropbox.com/sh/ymp4t54s73hisiw/AAD7yXVqmFLfuKGiOgmXPHVqa?dl=0

At least one of them contains an "original" document representing the novel "A Christmas Carol" by Charles Dickens. Your task is to find out which of these nine very similar documents are original. It is known that the SHA-256 hash of the "original" document is:

HEX: F0968458E7E0823103872A503A350D90E607DE71E2B2BF486E884C746CDF3EEE

Which of these nine documents is an "original"? List out the SHA-256 hashes of each of the documents. Create a PDF document that contains your answer.

3. Upload your PDF document from (2) to a Dropbox account.

- If you do not have a Dropbox account, create one.

- Upload the PDF document; it doesn't matter where.

- Capture a link to this document and paste it into the comments box in of your assignment submission. Label this link "Question 3".

4. i. Create an event that takes place at a particular time on a particular date in March 2016.

ii. Create an event that takes place all day on a particular date in March 2016.

iii. Create an event that takes place and repeats once a week for all the weeks in March 2016.

iv. Create an event that takes place for five consecutive days (Monday through Friday) in March 2015.

Ensure your Google Form and Google Calendar are publically accessible and paste the URL for each into the comments box of your assignment submission. Label these links "Question 4".

5. As D2L Dropbox requires the submission of at least one file, submit your PDF from (2)

Reference no: EM131001056

Questions Cloud

Determine the rejection region for a hypothesis test : (i) state the appropriate null and alternative hypotheses; (ii) determine the appropriate test statistic; (iii) determine the rejection region for a hypothesis test at the α = 0.05 signi?cance level; (iv) determine the associated p-value. (v) Wh..
How does this actor impact the story of conflict : What are its strengths, limitations, etc? How does this actor impact the story of conflict? In addition to the short assessment (250 words), provide three quotes from the text including page numbers
Prepare the journal entries to record these transactions : Purchases of merchandise on account during the year totaled $845,000. Merchandise costing $902,000 was sold on account for $1,420,000. Prepare the journal entries to record these transactions.
Do you agree that desire has mechanical nature of machine : Do you agree with this model of machines, or do you think that there are processes in the human body, mind or in nature in general that do not fit this framework? Do you agree that desire has the mechanical nature of a machine
Is security really all that important to you : Spend some time thinking about how you view computing security in a connected world. Is security really all that important to you? Do you feel vulnerable? Do you feel like you are doing enough to protect yourself? Are you thinking about ways of en..
Write about youth drug addiction causes and concerns : Write about Youth drug addiction causes and concerns related to sociology
Why are multiple role relationships potentially problematic : Why are multiple role relationships potentially problematic? How can multiple role relationships be either avoided or handled professionally
Using labor market graph with appropriately labelled x-axis : Suppose that in the United States corn production uses land and labor, while beer production uses capital and labor. Labor is mobile between the corn and beer industries, while land is specific to the corn industry and capital is specific to the beer..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd