Reference no: EM133106843
4064CEM Foundations of Cyber Security - Coventry University
Assignment:
Learning Outcome 1: Identify well-known security issues
Learning Outcome 2: Demonstrate how well-known security vulnerabilities can be both exploited and corrected
Tasks Description:
Task 1: Linux commands: all the tasks in Task 1 should be fulfilled via the Command Line Interface (CLI).
As a root, create a user with the username being ehcs2022. You chose your own password for this account. Then login as ehcs2022
Provide a command to go to your home directory. For the rest of the tasks, unless specified otherwise, you are supposed to be in your own home directory before you fulfil the tasks.
If for some reasons you failed to fulfil Task 1-(1), you can fulfil the rest of the tasks under any existing home directory on your Linux system.
Provide a command to show the current date.
Provide a command to display one-line description of df.
(i) Create a directory named myDir
(ii) Within myDir directory, create an empty file named myFile
(iii) Within myDir directory, use only one command to create the following empty files:
myFile1, myFile11, file2, file6, file12, file22, file33, file42
(iv) Within myDir directory, use an appropriate wildcard to copy all the files whose file names start with myFile to the parent directory
(v) Within myDir directory, use an appropriate wildcard to delete the following files in an interactive way (i.e. a confirmation is required before a file is deleted):
file12, file22, file42
(6) Display the kernel name and the kernel version of your Linux system.
(7) Create an alias called 'myhost' that echoes the hostname of your Linux system
(8) (i) Display the first 3 lines of /etc/passwd
(ii) Create a file named passwd.txt that stores the last 2 lines of /etc/passwd
Task 2: Information Gathering
(1) Use Google Advanced Operators to form a query that returns the following results:
(i) Web pages with "index of" in the title and "COVID-19" in the text
(ii) Web pages from www.indeed.co.uk that contain "cyber security" in their titles.
(iii) Web pages with "webcam" in the title and "login" in the URL link
(2) List two (2) Linux commands for obtaining IPv4 address of www.coventry.ac.uk
(3) List a Linux command that starts Apache HTTP Web server
(4) List a Linux command that display the running service(s) and the OS details of the local host.
Task 3: Use Wireshark to fulfil the tasks relevant to the traffic captured in in traffic-ResitDeferral.pcapng (available on material)
(1) What is the display filter expression so that only the HTTP traffic containing the IP address of 5.134.4.207 is shown?
(2) What is the client-side browser type?
(3) What is the web server name (Host) of 5.134.4.207?
(4) What Portable Document Format (PDF) document on the web server was accessed by the client?
Task 4: Hashing, symmetric cryptography and asymmetric cryptography are the techniques used for secure communication in the presence of third parties.
(1) explain how message integrity is provided, and list three existing algorithms for message integrity.
(2) provide the advantages and disadvantages of using symmetric cryptography and asymmetric cryptography for confidentiality, and explain how these two techniques can be combined in order to provide confidentiality with high performance
Attachment:- Cryptography.rar