Cryptography and Network Security Applications - Engineering Assignment Help

Download Solution Order New Solution
Assignment Task :

Part I Cryptographic Keys and User Authentication 

As the company grows, John fears legitimate users may be impersonated to access company network resources. You know that Kerberos would be the answer to John’s requirement regarding user authentication. 

Your task for this part is to explain Kerberos’ cryptography aspects, including: 

• Type/s of encryption used in Kerberos; 

• Its cryptographic keys; and 

• Algorithm/s. 

• Key distribution You must also: 

• Recommend a commercial software program for user authentication; and 

• Explain and justify your recommendation clearly. 

 

Part II Cloud Computing and Blockchain for Handling the Company's Data 

As you were already informed, Johns wants to keep his company’s valuable data secure. He told you that he has heard about Cloud Computing and blockchain, as a result, he wants to know if they could be used to keep the company’s data secure. For this part, you are required to: 

• Explain the possibility of employing Cloud Computing (CC) for the company to protect valuable data. 

• You have to recommend a kind/s of CC service/s to be used for the company’s data as well as how data may be sent to an authorised partner securely using the Cloud. You will have to justify why you recommend such CC service/s over the other services. 

• Explain blockchain in detail to John. Furthermore, list and describe any drawbacks and advantages of employing blockchain in general. 

• You are to advise the possibility of using Blockchain to keep the company’s data secure and whether blockchain is suitable for this purpose. Explain any drawbacks and advantages of employing blockchain within the company. 

• You will have to explicitly make a recommendation and justification on employing blockchain for storing the company’s data. 

See Next Page for Part III 

 

Part III Network Diagram employing Kerberos and Cloud Computing for Brisbane Branch 

Employing Kerberos for user authentication and Cloud Computing can be an effective means of protecting the company’s valuable data. As such, you are required to design a network diagram for the Brisbane branch of the company. To do this, you will need to consider the existing devices (see “About the company” – Brisbane branch ONLY), user authentication software you recommended in Part I, and Cloud Computing service/s you recommended in Part II. 

You are required to: 

1. Draw your proposed network diagram, including: 

a. User authentication software

b. Cloud Computing service integrated to the Brisbane branch network

c. Existing devices (e.g. servers, workstations, router, switches) 

 

2. Explain and justify the proposed network diagram with respect to the placement and purpose of each piece of hardware/software, user authentication software and CC service.

 

This Engineering Assignment has been solved by our Engineering  Experts at My Uni Papers. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.