Reference no: EM131188767 , Length: word count:1000
COIT12202 -Network Security Concepts Assignment
Short-answer questions
Question 1: Information security is used to describe the tasks of protecting information in a digital form.
(1) List and explain three key objectives of information security.
(2) Also list and explain at least two additional protections (concepts)to present a complete view of information security.
Question 2: ARP (Address Resolution Protocol) Poisoning is a form of attack in which an attacker sends falsified ARP messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.
(1) Use an example to illustrate (diagrams or written explanation) the ARP Poising attack process and
(2) Explain at least two strategies to prevent such kind of ARP spoofing.
Question 3: Integrity protection is used to guard against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.
(1) Explain the kinds of technologies (algorithms) that can be used to guarantee data integrity.
(2) Provide two examplesof data integrity and
(3) Explain how DLP (Data loss prevention) can be used to prevent data leakage.
Question 4: The earliest and the simplest use of a substitution cipher was by Julius Caesar.
Assume that Alice received the following message "skkzskglzkxznkzumgvgxze" from Bob, who used Caesar Cipher to let Alice know "meet me after the toga party".
Please complete the following tasks:
(1) Explain the cryptographic algorithm of Caesar Cipher.
(2) Explain what the plaintext is, what the ciphertext is and what the possible key value is.
(3) Explain an approach that can be used to attack Caesar Cipher. Is it possible to improve the cryptographic algorithm?
Question 5: RSA is an algorithm to encrypt and decrypt messages. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described RSA in 1978. A user of RSA creates and then publishes the product of two large prime numbers along with an auxiliary value as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. However, with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.
Answer the following questions:
(1) Explain whatcategory of cryptographic algorithms RSA belongs to.
(2) Explain how RSA is used to achieve thecryptography (encryption and decryption) and digital signatures.
(3) Explain the main weakness of digital signatures and how this weakness can be compensated for.
Consistent with the business cycle theory
: a) Unemployment is strongly countercyclical. Is this stylized fact of the business cycle fact consistent with the Business Cycle theory?
|
Determine the net work output, in kw h per year
: A power cycle receives energy by heat transfer from the combustion of fuel and develops power at a net rate of 150 MW. The thermal efficiency of the cycle is 40%.
|
Which quality process improvement tools would bring benefit
: Now that you have defined the quality dimensions, you will need to determine which quality process improvement tools and techniques would bring the biggest benefit to your project.
|
Means of encouraging improvements in human rights
: More than 500 U.S. firms have developed offices or factories in China. Many other U.S. firms have become exporters to China in recent years. However, the U.S. government has periodically threatened to restrict business between the United States and C..
|
List and explain key objectives of information security
: Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..
|
Analyze planned actions in soliciting and awarding contracts
: Analyze the planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency in question is in compliance with the FAR requirements.
|
Compute the total cost of inventory
: Joe's Bar (not its real name) uses 800 kegs of adult beverages per year on a continuous basis (assume 365 days of operations per year). Determine the reorder point d. Compute the Total Cost of Inventory.
|
How would you carry out the analysis
: Under pressure by regulators and consumers, the company is considering lowering the price of the medicine by 10 percent. The company has hired you to analyze the effect of such a cut on its profits. How would you carry out the analysis? What infor..
|
Define incremental cash flow
: Define incremental cash flow and Should you subtract interest expense or dividends when calculating project cash flow - Calculate the annual sales revenues and costs (other than depreciation). Why is it important to include inflation when estimating..
|