Fundamentals of Cyber Security - IT Computer Science Assignment Help

Download Solution Order New Solution

Assignment Task

Short Answer Questions:

1. An email platform where a person cannot deny having sent an email by requiring digital signature on all emails protects which of the following security goals: Confidentiality, Integrity, Availability, authenticity and non-repudiation? 

 

2. Explain “Market for lemon applies to security”? How to fix this issue? 

 

3. “Security by obscurity” should be encouraged or discouraged? Why? 

 

4. “Lack of user awareness and training” should be classified as a threat, vulnerability or an exploit? 

 

5. In the code below, “printf didn’t check the number of placeholders and variables. Which type of software vulnerabilities will this code result in?

#include

Int main () 

{

int id=100, age=23; char *name = “Bob”;

printf(“ID: %d, Name: %s, Age: %d\n”, id, name); 

 

Case Study Questions: 

1. Ashley Madison is one of the first online dating websites that started from 2001. They used MD5 to store customers’ pwd. In 2015, 11million users' passwords are cracked in 10 days. 

  • 1) Please first explain why in the server side, the ciphertext encrypted by symmetric cryptography should NOT be used to store customers' passwords. 
  • 2) Ashley Madison used MD5 hashing at the beginning. Please explain why MD5 hash is vulnerable. 
  • 3) Suggest one method to prevent the above vulnerability in MD5-based password. 

 

2. If your company would like to use VPN to create the secure communication with all its customers. Your company applies AES-128 bits (Advanced Encryption Standard) to provide VPN services for the communication between you and other parties. Since AES is a symmetric encryption method, there must be a secret key exchange before AES is used for the secured communication. 

  • 1) Which algorithm would you choose to exchange this key before AES is used to encrypt and decrypt the messages between your company and your customers? 
  • 2) Undertake a cryptanalysis and explain why a middle person cannot steal this shared secret key. 

 

3. RSA algorithms can be used in different protocols, such as TLS1.2, IPsec, SSH protocols to guarantee secure communications for different scenarios. But it can also be used by a hacker to design ransomware. If you are the hacker and wish to encrypt a victim’s files in a short time, list which method would you use to lock the victim’s files and explain how it works

 

This IT Computer Science Assignment has been solved by our IT Computer Science Experts at My Uni Papers.  Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK and US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing Style. Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered.

You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive plagiarism (with free Turn tin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.