Organization managing public information on its web server

Assignment Help Computer Network Security
Reference no: EM13762236

Question 1:

(a) Comment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.

(i) An organization managing public information on its Web server.

(ii) A law-enforcement organization managing extremely sensitive investigative

(iii) A financial organization managing routine administrative information (not privacy-related information).

(b) Explain, with examples, what active attacks are and how one would counter such attacks.

Question 2:

(a) (i) Apply stream ciphering encryption technique and describe how it can be used to provide confidentiality of messages. Illustrate your answer with an example.

(ii) RC4 algorithm is a common example of stream ciphering. Briefly explain the possible strength and weakness of this algorithm.

(b) (i) Consider the following message packet;

    Actual Data    Timestamp      Sequence Number

Suppose there is a secret key algorithm and Alice and Bob share a secret key for this algorithm. Message authentication is achieved using hash function. Discuss a possible problem scenario, given that an adversary Charles gets hold of the message and the hash function is not strong?

(ii) Apply Caesar's substitution cipher and determine the ciphertext for the message "cybersecurity", if the key is equal to 6.

Question 3:

(a) Demonstrate the TWO common approaches to providing message authentication without encryption. Illustrate your answer with the aid of appropriate diagrams.

(b) Apply public-key system (PKS) technique to describe how message authentication can be achieved. Illustrate your answer with the aid of a diagram.

Question 4:

(a) You have just been joined a company as their network administrator. As the network infrastructure is undergoing changes, you are asked to look into the possibility of implementing an intrusion detection system (IDS). Based on your initial observation, you found out that there were shortages of IT personnel as many of them have either left or retired. You got hold of some preVious information relating to the staff's profiles and system usage statistics. Management has no issue on approving the budget for the implementation of an IDS system.

(i) Based on the information given, will you be able to recommend which approach of intrusion detection system to implement or would more studies still need to be conducted. Justify your answer.

(ii) Whichever IDS approach recommended, are there any intrusions that are difficult to detect? Illustrate your answer with an example.

(b) Apply using packet filtering firewall and explain how this type of firewall can be used to provide security protection to an organization. Illustrate your answer with appropriate example.

Reference no: EM13762236

Questions Cloud

How does technology affect the productivity : How does technology affect the productivity and cost of the industry you currently work for or you are familiar with? How do the technical and economically efficient concepts shape the long-run average total-cost curve of this industry?
Logical expression : write a short paper on what your program does. Include the logical expression and what type of while loop (EOF, sentinel-controlled, counter-controlled, flag-controlled) you need. Using the same logical expression as above, use a different while l..
What do you believe is solution to social security crisis : What do you believe is the solution to the Social Security crisis? Why do you think reforms have not been implemented despite the consensus that the program is unstable?
Compresses a horizontal massless spring : A block of mass 2 kg is kept at rest as it compresses a horizontal massless spring (k = 120 N/m) by 8.52 cm. As the block is released, it travels 0.611 m on a rough horizontal surface before stopping. The acceleration of gravity is 9.8 m/s2 . Calcula..
Organization managing public information on its web server : omment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. An organization managing public information on its Web serv..
Dilutive eps of wonderful incorporation : If Wonderful has 29,000 shares of common stock outstanding throughout the year and its Net Income is $12,000 after paying the preferred dividends, what will be the dilutive EPS of Wonderful incorporation under treasury stock method? Round your ans..
An object of mass m is lowered at constant velocity : An object of mass m is lowered at constant velocity at the end of a string of negligible mass. As it is lowered a vertical distance h, its gravitational potential energy changes by?Ug = -mg hHowever, its kinetic energy remains constant, so that if we..
Recognize compensation expense on books : The service period is for 3 years, beginning January 1, 2010. As a result of the option granted to Wine, using the fair value method, Ellison should recognize compensation expense on its books in the amount of
Developing ipv6 : What is the primary reason for developing IPv6

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd