Reference no: EM13762236
Question 1:
(a) Comment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.
(i) An organization managing public information on its Web server.
(ii) A law-enforcement organization managing extremely sensitive investigative
(iii) A financial organization managing routine administrative information (not privacy-related information).
(b) Explain, with examples, what active attacks are and how one would counter such attacks.
Question 2:
(a) (i) Apply stream ciphering encryption technique and describe how it can be used to provide confidentiality of messages. Illustrate your answer with an example.
(ii) RC4 algorithm is a common example of stream ciphering. Briefly explain the possible strength and weakness of this algorithm.
(b) (i) Consider the following message packet;
Actual Data Timestamp Sequence Number
Suppose there is a secret key algorithm and Alice and Bob share a secret key for this algorithm. Message authentication is achieved using hash function. Discuss a possible problem scenario, given that an adversary Charles gets hold of the message and the hash function is not strong?
(ii) Apply Caesar's substitution cipher and determine the ciphertext for the message "cybersecurity", if the key is equal to 6.
Question 3:
(a) Demonstrate the TWO common approaches to providing message authentication without encryption. Illustrate your answer with the aid of appropriate diagrams.
(b) Apply public-key system (PKS) technique to describe how message authentication can be achieved. Illustrate your answer with the aid of a diagram.
Question 4:
(a) You have just been joined a company as their network administrator. As the network infrastructure is undergoing changes, you are asked to look into the possibility of implementing an intrusion detection system (IDS). Based on your initial observation, you found out that there were shortages of IT personnel as many of them have either left or retired. You got hold of some preVious information relating to the staff's profiles and system usage statistics. Management has no issue on approving the budget for the implementation of an IDS system.
(i) Based on the information given, will you be able to recommend which approach of intrusion detection system to implement or would more studies still need to be conducted. Justify your answer.
(ii) Whichever IDS approach recommended, are there any intrusions that are difficult to detect? Illustrate your answer with an example.
(b) Apply using packet filtering firewall and explain how this type of firewall can be used to provide security protection to an organization. Illustrate your answer with appropriate example.
How does technology affect the productivity
: How does technology affect the productivity and cost of the industry you currently work for or you are familiar with? How do the technical and economically efficient concepts shape the long-run average total-cost curve of this industry?
|
Logical expression
: write a short paper on what your program does. Include the logical expression and what type of while loop (EOF, sentinel-controlled, counter-controlled, flag-controlled) you need. Using the same logical expression as above, use a different while l..
|
What do you believe is solution to social security crisis
: What do you believe is the solution to the Social Security crisis? Why do you think reforms have not been implemented despite the consensus that the program is unstable?
|
Compresses a horizontal massless spring
: A block of mass 2 kg is kept at rest as it compresses a horizontal massless spring (k = 120 N/m) by 8.52 cm. As the block is released, it travels 0.611 m on a rough horizontal surface before stopping. The acceleration of gravity is 9.8 m/s2 . Calcula..
|
Organization managing public information on its web server
: omment on each of the following assets, by assigning a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. An organization managing public information on its Web serv..
|
Dilutive eps of wonderful incorporation
: If Wonderful has 29,000 shares of common stock outstanding throughout the year and its Net Income is $12,000 after paying the preferred dividends, what will be the dilutive EPS of Wonderful incorporation under treasury stock method? Round your ans..
|
An object of mass m is lowered at constant velocity
: An object of mass m is lowered at constant velocity at the end of a string of negligible mass. As it is lowered a vertical distance h, its gravitational potential energy changes by?Ug = -mg hHowever, its kinetic energy remains constant, so that if we..
|
Recognize compensation expense on books
: The service period is for 3 years, beginning January 1, 2010. As a result of the option granted to Wine, using the fair value method, Ellison should recognize compensation expense on its books in the amount of
|
Developing ipv6
: What is the primary reason for developing IPv6
|