Understanding of cryptography and its role to n/w security

Assignment Help Computer Network Security
Reference no: EM13951390

Background Readings: To assure a trusted and resilient information and communications infrastructure, it is essential to secure the computer networks. Computer networks are implemented via technology. Part of solutions of their security in essence need to be via technology as well. The following two presentations provide the security protocols common in computer networks.

Kizza. Computer Network Security Protocols and Standards. Presentation.

Perlman, R. (2004), Network Security Protocls: A Tutorial. Presentation.

As you see from the presentations, to understand computer network security protocols, it is important to understand what cryptography is, as it is the building block of security protocols. The following reading provides a thorough review:

Kessler, G. (2011). An overview of cryptography. Retrieved from https://www.garykessler.net/library/crypto.html

If one is new to cryptograph, it takes some time for one to understand it. Maybe some hands-on practice will be helpful. You don't have to get it all figured out, but give it a try. You may find it interesting.

There's a program out there called Pretty Good Privacy (PGP), that provides personal encryption capabilities essentially equal to those available to almost all governments and capable of ensuring information privacy against almost if not absolutely all attacks. It has a long and interestingly checkered history, including having been at one time an illegal munition of war. Originating as freeware, it now exists in both free and commercial incarnations.

You'll also want to look at the discussion and links to some versions of the program on Phil Zimmermann's website (https://philzimmermann.com/EN/findpgp/) and at the GNU Privacy Guard website (https://www.gnupg.org/), which provides a free implementation on the Open Source model.

Now you have been exposed to technical solutions to security. Please also understand the challenges afflicated with technical solutions. The following article pinpoints the forever challenge to technology:

Schneier, B. (2012), How Changing Technology Affects Security. IEEE Security & Privacy. March/April 2012.

Is using an encryption system like PGP a good idea for individuals and organizations? And why?

Looking for:
Ability to consolidate ideas from reading materials.
Demonstration of understanding of cryptography and its role in network security.
Critical views on the advantages and disadvantages of technical solutions to security.

Reference no: EM13951390

Questions Cloud

Record the sale of net assets on the books of crow company : Record the acquisition of the net assets of Crow Company on Bart Company's books. Record the sale of the net assets on the books of Crow Company.
Compare and contrast telnet and ftp and discuss the downfall : Determine whether or not additional components could be added to the IPv4 protocol to enhance its usefulness.
What is relationship between color and wavelength for light : Which lists of different types of electromagnetic radiation is correctly ordered in wavelength, from shortest to longest?
How do tables track the state and context of exchange packet : What are stateful inspection firewalls and how do the tables track the state and context of each exchanged packet?
Understanding of cryptography and its role to n/w security : Critical views on the advantages and disadvantages of technical solutions to security.
What amounts will be recorded for the machine : After your examination of the ?nancial statements and the acquisition agreement. Assuming a 30% tax rate, what amounts will be recorded for the machine, deferred tax liability, and goodwill?
Problem regarding the safe environmental practices : Chinese government investigators recently discovered that Fountain Set has contaminated a local river by dumping dye waste into it. What responsibility do U.S. companies have to ensure safe environmental practices?
Is the variance favorable or unfavorable : Analyze laundry costs for the month of September using the procedures for calculating a controllable overhead variance, Is the variance favorable or unfavorable?
Law of business organisations : Law of Business Organisations - Register a Proprietary Limited Company. You should refer to Section 117 of the Corporations Act, complete an application form ,Form 201, and prepare all relevant consents.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Nowadays the internet has been very broadly used as a means

nowadays the internet has been very widely used as a means of receiving and processing lots of information which are

  Federal government regulates labels

The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

  Describes how malicious code can get on your company

Which statement best describes the advantages of public key encryption?

  Explain the three general sources of security threats and

explain the three general sources of security threats and five types of security losses. your response should be at

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Describe situations where end-to-end encryption combined

Give some examples where traffic analysis could jeopardize security. Describe situations where end-to-end encryption combined with link encryption would still allow enough traffic analysis to be dangerous. about 150 words with references

  Security by obscurity

Defacement, Infiltration, Phishing, Pharming, Insider Threats, Click Fraud, Denial of Service, Data Theft/Loss, IP Whitelisting and IP Spoofing, recursive PHP functio, worm and a virus, hash on a string using MD5

  Analyze three enhancements that have been added to wireless

wireless networking and unified communication networks please respond to the following1.analyze three enhancements that

  Explain cross site scripting attack

Explain Cross Site Scripting attack

  Cyber weapon

Single Sign On (SSO), Single Sign On (SSO), netstat -an, arp -a, ipconfig /displaydns, MS Config. Means, MS Config. Means, network reconnaissance

  Protection of transmitted information-sensitive data stored

You must include in your investigation protection of both transmitted information also sensitive data stored locally in computer databases.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd