What kind of cryptographic algorithms are supported

Assignment Help Computer Network Security
Reference no: EM133818514

To prepare:

Install Apache HTTPD. web server with OpenSSL.

Review all tasks to complete for the Assignment this week. Note: Screenshots are required for all major steps.

Assignment Tasks:

Part 1:

Generate self-generated root keys for the HTTPD server.
(Optional) Alternatively, obtain a trusted certificate for your server

Configure the Apache server with strong cryptography. You are only allowed to use an RSA key with at least 2048 bits with corresponding cryptographic primitives, such as DH-2048, SHA-256, and AES-128.

Ensure you can connect to your Apache HTTPD server with https.

Test your Apache server using the test from either
Note: In order for you to use ssllabs.com to test your server, you need to use names like "ec2-54-71-23-43.us-west-2.compute.IBMcloud.com" instead of the numeric IP addresses.

Use the OpenSSL command line to connect to your SSL server.  Do You Need Help?

For example, use a command such as:openssl s_client -connect yoursApacheHttpsServer:port -cert xxxx.pem -key yyyy.pem.Submit a 3- to 5-page report in Microsoft Word and APA format that includes the following:

Describe in detail the steps you have taken to complete the Assignment, including screenshots for all major steps. Your report should contain:

All the steps and commands that you used to install OpenSSL

All the steps and commands that you used to install your secure Apache server

The process (including screenshot) that you used to generate the root keys

A screenshot showing what kind of cryptographic algorithms are supported in your Apache server

A screenshot to show that you can connect to your Apache HTTPD server with https

The report on testing your Apache server using the test from

A screenshot of the successful connection using the OpenSSL command line to connect to your SSL server

Part 2:

To prepare: 

In the Amazon AWS Ubuntu machine, download memory images from NIST CFReDS project located here:
-rw-rw-r-- 1 ubuntu 1065246720 Apr 14  2006 boomer-win2003-2006-03-17.img
-rw-rw-r-- 1 ubuntu ubuntu 1065246720Feb 27  2006 boomer-win2k-2006-02-27-0824.img
-rw-rw-r-- 1 ubuntu ubuntu 1065250816May 26  2006 vista-beta2.img
-rw-rw-r-- 1 ubuntu ubuntu  536715264 Oct 19  2005 xp-laptop-2005-06-25.img
-rw-rw-r-- 1 ubuntu ubuntu  536715264 Oct 19  2005 xp-laptop-2005-07-04-
You need to analyze these images using the vol command. For help, run
# vol.py -h

After you are familiar with the vol command, try to analyze these images to find valuable information. For example, you may try the following command to see whether there is any openvpn password in the memory image xp-laptop-2005-06-25.img.
# vol.py openvpn -f xp-laptop-2005-06-25.img

After analyzing these five NIST images, you need to analyze the honeynet banking trouble image "Bob.vmem". for the detailed case description.

Lastly, you need to analyze the image "0zapftis.vmem" that contains malware R2D2

Submit a report of 3-5 pages in Microsoft Word and APA format that contains the following:

Major valuable information that you find in these images and the significant screenshots showing that you found the evidence.

Note: To indicate to your Instructor that you found the evidence on your own from your computer, please include in your screenshots the computer name/timestamps, etc. For example, before you take the screenshots, you may run the following commands to show the time and your IP addresses:
ubuntu@siftworkstation:~$ date
Wed Sep 13 14:22:29 UTC 2017
ubuntu@siftworkstation:~$ who
ubuntu   pts/0        2017-09-13 14:22 (cpe-75-181-82-113.carolina.res.rr.com)
ubuntu@siftworkstation:~$ last
ubuntu   pts/0        cpe-75-181-82-11 Wed Sep 13 14:22   still logged in  
ubuntu   pts/0        cpe-75-181-82-11 Wed Sep 13 12:39 - 14:20  (01:41)   
reboot   system boot  3.13.0-125-gener Wed Sep 13 12:38 - 14:23  (01:45)   
ubuntu   pts/0        cpe-75-181-82-11 Wed Sep 13 12:05 - down   (00:32)   
reboot   system boot  3.13.0-125-gener Wed Sep 13 12:01 - 12:38  (00:36)

Your document should be 3-5 pages (including screenshots but not including the title page and list of references), but it is the quality of the work that is important, not the number of pages. Cite and reference all sources using APA 7 format and style guidelines and submit in a single document.

Reference no: EM133818514

Questions Cloud

What is the present situation and the desired future state : What is the present situation, the desired future state and the gaps that exists between them for the following areas of the organization?
Create a short case scenario involving a nurse educator : Create a short case scenario involving a nurse educator who is teaching in a didactic environment as part of their academic or professional development role
What case can be made for or against notion that animal have : What case can be made for, or against, the notion that animals have the ability to acquire and use true language?
How did goebbels interpret the start of world war ii : How did Goebbels interpret the start of World War II? When considered collectively, why are these sources historically significant?
What kind of cryptographic algorithms are supported : Configure the Apache server with strong cryptography. You are only allowed to use an RSA key with at least 2048 bits with corresponding cryptographic
Why are you becoming a nurse practitioner : Why are you becoming a Nurse Practitioner? Find one research article, expert opinion about the Nurse Practitioner role and summarize the article.
Discuss the three most pertinent pieces of information : Discuss the three most pertinent pieces of information from article that you feel have greatest impact on life of individual diagnosed with Alzheimer's Disease.
Identify a current article on nursing administration : Identify a current article on Nursing Administration, another current article on Nursing Education, and a third current article on the Advanced Practice Nurse.
How have you expanded or changed your personal philosophy : How have you expanded or changed your personal philosophy of nursing since you started the RN BSN program?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd