Operating systems persistent storage

Assignment Help Computer Network Security
Reference no: EM132616649

CTEC5801 - Foundation of Cyber Security - De Montfort University

Combined Coursework

Learning Outcomes

Learning Outcome 1: Create a new or modify an existing C program in order to complete a given specification
Learning Outcome 2: Explain and demonstrate understanding of an operating system's persistent storage
Learning Outcome 3: Evaluate and justify the use of cryptographic tools and techniques in an application context
Learning Outcome 4: Critically analyse network traffic to identify potential vulnerabilities
Learning Outcome 5: Relate knowledge of topics to cyber security domain

Task 1. Write a C program to implement a Vigenère cipher. You may use whatever IDE you wish but the program must be compile with the standard gcc compiler. Your program should give the user the option to either encrypt or decrypt a message. The user should be prompted to enter the passphrase to be entered and the keyword to be used in the cipher. The output should be text printed to stdout. Comments should be used to explain the rationale behind the design of your code. You must also provide a critical analysis as to the robustness of the Vigenère cipher and provide a recommendation as to whether or not it would be it would be sufficient for use in communications between colleagues within a non-technical environment.

Task 2. In your role as an Information Security Specialist for Global Designs Limited, you have been tasked with creating a set of policies for secure data. The data stored by Global Designs Ltd has a useful lifetime of 1 year, after which it is deleted. This deletion is done simply using the delete functionality of the Operating System. You are required to determine if this is adequate to fully delete the data, if not provide potential ways to recover the data and recommendations for how the data could be securely destroyed. They have asked that the report contains an overview of how data is deleted and recovered at a level the non-technical staff can understand as well as a more technical explanation of the architectural differences between the two for the IT Department. You may include any images or other supporting material within a single appendix. The report should not exceed 1,500 words.

Task 3. In your role as a consultant for Data Storage Solutions, you have been tasked with providing a report into the current state of the art encrypted e-mail solutions. Identify if information can be extracted from e-mails if the network traffic has been intercepted. If it can, identify how the solutions you have assessed solve this problem. Different existing solutions should be considered, critically analysed and compared. Additionally, an overview of the current state of the art research in the field should be included. At the end of the report, clear guidelines should be included detailing when it would be most appropriate to use each solution covered in the main report.

Task 4. Download the pcap file CTEC5801_coursework.pcap and analyse the traffic. Identify, analyse and explain all connections and interactions you can identify. Assess whether or not any of the connections might be suspicious, identify these and explain why they might pose a danger. You must include:
- Start frame
- Mac address of host initiating the connection
- Mac address of destination host
- IP address of host initiating connection
- IP address of destination host
- The port used by the initialising host
- The port used by the destination host

Attachment:- Foundation of Cyber Security.rar

Reference no: EM132616649

Questions Cloud

What constant amount could withdraw each year : If you have $28 000 in an account earning 10% annually, what constant amount could you withdraw each year and have nothing remaining at the end of 4 years?
Compare two fundamental security design principles : After reading chapter 1, compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations.
Describe the four financial statements for balance sheet : Describe the 4 financial statements: balance sheet, income statement, statement of stockholders' equity, and statement of cashflows
Explain three main doctrines of negotiability : Mr and Mrs J were directors of a company, E Services Ltd. The company's bank accounts were always in credit - often to a very significant extent - and had never
Operating systems persistent storage : Explain and demonstrate understanding of an operating system's persistent storage and Evaluate and justify the use of cryptographic tools and techniques
Describe the key styles of leadership : Describe the key styles of Leadership and provide an example/scenario for each, to support your answer.
How are the four types of data analytics used : How are the four types of data analytics used for The Estee Lauder Companies Inc.? Descriptive analytics./ Diagnostic analytics
Obtain a number of additional documents : As a mortgage broker, There have been recent changes to the level of 'reasonable enquiries' required to assess a client's financial position
Stop loss strategy while trading : In financial valuation webinar Professor Andrew Stotz mentioned (Risk Management)that investor should maintain a stop loss strategy while trading.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat. The profile should contain the name of the threat, the systems it attacks, how it performs its attack and the mitigation strategies.

  Emerging Threats Assignment Problem - Security Policies

Emerging Threats assignment help and solutions - What security policies will need to be built into your company's overall existing security program to ensure.

  Develop an attack tree for stealing a twitter handle

Develop an attack tree for stealing a Twitter handle that encompasses the basics of these attacks, as well as other threat vectors you can think of. Your tree should include at least 25 nodes and be comprehensive

  What is the name of the certificate issuing authority

What is the login name and password used for connecting to the ftp server - What files were downloaded? Give their complete download path and their sizes.

  Securing of computer forensics evidence

Securing of Computer Forensics Evidence

  Computer forensics investigation

After a computer forensics investigation, you require to meet with your section or group of fellow investigators and critique the case in an effort to improve your work.

  How to generate the same hash value

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  How modify network''s dns zones or records

modify your network's DNS zones or records

  Explain cross-talk and other forms of interference

Cross-talk, and other forms of interference are a significant issue in any communications infrastructure. Compare and contrast how this problem would manifest for analog data transmitted

  What comparison of means test was used

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic

  Compare and contrast frequency spectrum and bandwidth

How is information sent across a transmission medium from the physical layer? Compare and contrast frequency spectrum and bandwidth.

  Describe and discuss the potential impact of recommendations

International politics are intermingled and cybersecurity issues carry political risks to impact the influences and outcomes on other political issues.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd