List and explain key objectives of information security

Assignment Help Computer Network Security
Reference no: EM131188767 , Length: word count:1000

COIT12202 -Network Security Concepts Assignment

Short-answer questions

Question 1: Information security is used to describe the tasks of protecting information in a digital form.

(1) List and explain three key objectives of information security.

(2) Also list and explain at least two additional protections (concepts)to present a complete view of information security.

Question 2: ARP (Address Resolution Protocol) Poisoning is a form of attack in which an attacker sends falsified ARP messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.

(1) Use an example to illustrate (diagrams or written explanation) the ARP Poising attack process and

(2) Explain at least two strategies to prevent such kind of ARP spoofing.

Question 3: Integrity protection is used to guard against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

(1) Explain the kinds of technologies (algorithms) that can be used to guarantee data integrity.

(2) Provide two examplesof data integrity and

(3) Explain how DLP (Data loss prevention) can be used to prevent data leakage.

Question 4: The earliest and the simplest use of a substitution cipher was by Julius Caesar.

1804_Figure.png

Assume that Alice received the following message "skkzskglzkxznkzumgvgxze" from Bob, who used Caesar Cipher to let Alice know "meet me after the toga party".

Please complete the following tasks:

(1) Explain the cryptographic algorithm of Caesar Cipher.

(2) Explain what the plaintext is, what the ciphertext is and what the possible key value is.

(3) Explain an approach that can be used to attack Caesar Cipher. Is it possible to improve the cryptographic algorithm?

Question 5: RSA is an algorithm to encrypt and decrypt messages. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described RSA in 1978. A user of RSA creates and then publishes the product of two large prime numbers along with an auxiliary value as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. However, with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.

Answer the following questions:

(1) Explain whatcategory of cryptographic algorithms RSA belongs to.

(2) Explain how RSA is used to achieve thecryptography (encryption and decryption) and digital signatures.

(3) Explain the main weakness of digital signatures and how this weakness can be compensated for.

Reference no: EM131188767

Questions Cloud

Consistent with the business cycle theory : a) Unemployment is strongly countercyclical. Is this stylized fact of the business cycle fact consistent with the Business Cycle theory?
Determine the net work output, in kw h per year : A power cycle receives energy by heat transfer from the combustion of fuel and develops power at a net rate of 150 MW. The thermal efficiency of the cycle is 40%.
Which quality process improvement tools would bring benefit : Now that you have defined the quality dimensions, you will need to determine which quality process improvement tools and techniques would bring the biggest benefit to your project.
Means of encouraging improvements in human rights : More than 500 U.S. firms have developed offices or factories in China. Many other U.S. firms have become exporters to China in recent years. However, the U.S. government has periodically threatened to restrict business between the United States and C..
List and explain key objectives of information security : Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..
Analyze planned actions in soliciting and awarding contracts : Analyze the planned actions in soliciting and awarding contracts and make recommendations to ensure the government agency in question is in compliance with the FAR requirements.
Compute the total cost of inventory : Joe's Bar (not its real name) uses 800 kegs of adult beverages per year on a continuous basis (assume 365 days of operations per year). Determine the reorder point d. Compute the Total Cost of Inventory.
How would you carry out the analysis : Under pressure by regulators and consumers, the company is considering lowering the price of the medicine by 10 percent. The company has hired you to analyze the effect of such a cut on its profits. How would you carry out the analysis? What infor..
Define incremental cash flow : Define incremental cash flow and Should you subtract interest expense or dividends when calculating project cash flow - Calculate the annual sales revenues and costs (other than depreciation). Why is it important to include inflation when estimating..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd