New

Learn smart - Learn online. Upto 88% off on courses for a limited time. View Courses

Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

61 Pages
Cybersecurity and Networking

IT Security Name of the Student: Name of the University: Author Note: 1 IT SECURITY Table of Contents Answer 1 ................................ ................................ ..... ...

Course

ICT50220

Subject

It Write Up

University

National Institute of Technology Australia

Season

Fall

5 Pages
MIS 504 Management Information Systems

Task: Is it safe to log onto a wireless network at an airport, library, or other public location? It depends on how vigilant you are. Even the wireless network in your home is vulnerable because ra ...

Course

MIS504

Type

Assignment

Subject

It Write Up

University

Al-Yamamah University

Season

Fall

139 Pages
Medical Interventions

301314 Artificial Intelligence Ethics and Organisations Spring 2021 Dr Jiansheng Huang School of Computer, Data & Mathematical Sciences 1 Lecture 4 AI Ethics Existing Frameworks References A ...

Course

301314

Subject

It Write Up

University

Western Sydney University

Season

Spring

105 Pages
Legal Debate

301314 Artificial Intelligence Ethics and Organisations Spring 2021 Dr Jiansheng Huang School of Computer, Data & Mathematical Sciences 1 Lecture 5 Data Governance References Yao, M., Zhou, ...

Course

301314

Subject

It Write Up

University

Western Sydney University

Season

Spring

CP5603 Advanced E Security

Question

Answered

Task

Assignment Scenario

A major company has asked you to assess two similar technologies, from a big-picture view (without too much technical detail), to help them decide which alternative they should use.

The general idea is for your report to:

1. Describe the two technologies (or more than two, if there are more).
 
2. Compare and contrast the two technologies. What are their good points and (more interestingly) their bad points or weaknesses?
 
3. Finally, what is your personal recommendation of which should a data-oriented company use? Explain why, perhaps by comparing their good points and bad points.  If all options seem bad, feel free to recommend “none of the above”.

Any two similar technologies would be fine, below are some possible topics:

A Few Possible Topics

1. An employee is travelling to a country that blocks access to some web sites, such as FaceBook, Google, and Wikipedia. Without using a VPN, which anonymous browser is best?

Pick any two, and compare them:

•The TOR browser

•FreeBrowser

•I2P browser

•FreeNet

Or any other anonymous browser that works without a VPN.  

2. Encryption key management:  should we use

•A certificate authority for an SSL/TLS key and certificate (like a web site uses), or

•Our own key server for our company, something like Kerberos protocol.

3. I work for a government that spies on other people. Which do you recommend a spy to use?

•A hardware keylogger, perhaps with WiFi to you never have to get it back, or

•A software keylogger (perhaps installed by a virus) to read the victim’s passwords.

4. Undeniable signatures are where someone cannot deny that they sent a message

There are several ways to do this, so describe two ways, and recommend what you think seems the best.  

5. In the United States, they have a law called the Communications Assistance for Law Enforcement Act (CALEA).

It requires companies that have computer networks (including Skype, Hotmail, Gmail, and all U.S. universities) to allow the U.S. Government to tap in to the private data of customers for real-time surveillance. This includes your emails, your Skype conversations, the data on your Apple phone, the data on your Microsoft Windows box, etc.

What should we use to prevent the U.S. Government from listening to your communication? Pick any two from:

•LinPhone

•SureSpot

•ChatSecure

•RedPhone

•Telegram

•Or may be a commercial alternative untouched by the U.S. Government, e.g., WeChat. 

6. How to send large binary files to a colleague, in a secure way? Should I use:

•Email attachments in MIME (given that email is not perfectly secure), or

•One-click hosting (also called a cyberlocker), such as www.mega.nz or similar?

7. On the subject of cyberlocker web sites, which one do you think is best? Take into account reviews of speed, is end-to-end encryption available, is it free, does the U.S. government read your files, and so on.
 
Remember that our company would value security above all else, so CALEA becomes very relevant, and end-to-end encryption would also be very nice.
 
8. In the world of Linux and Unix operating systems, initd is the original program that calls other programs, but lately a more complicated alternative called systemd has caught on. Critics say that systemd is so large and complex, that it has become a security problem.  Is systemd really all that bad? Should we use initd (or an alternative, like runitd) instead?  

9. Cryptographic hash functions are a basic technology used in many encryption methods.

Some hash functions are:

•Older but popular ones like MD5 and SHA-1

•Newer ones that are supposed to be better, like BLAKE2, SHA-3, and Tiger.

Is newer really better?  Or are the older generation still okay?  

10. I’m a criminal who wants to use a virus to run Bitcoin mining on someone else’s computer, without them knowing.  (It’s kind of like stealing electricity).

What should I use:

•Cryptojacking:  install JavaScript code on a web page, that runs Bitcoin mining on the victim’s computer, through their web browser.

•A computer virus that mines cryptocurrency, such as PWOBot (it’s called PWOBot because it’s written in Python).

11.What is the difference (if any) between the:

•Deep web (which usually means any web sites not indexed by search engines).

•Dark web (which usually means web sites doing criminal stuff).

Is one a subset of the other, or are they different but overlapping, or what?

12. Encrypted, blockchain-based cryptocurrencies are popular today.

What is the difference (if any) between:

•Bitcoin, and

•Etherium (or any other cryptocurrency that isn’t Bitcoin, such as Zcash).

If all cryptocurrencies seem bad to you, feel free to recommend not to use any.

CP5603 Advanced E Security

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

30 More Pages to Come in This Document. Get access to the complete answer.

Specially designed essay help services have made MyAssignmenthelp.com one of the most prolific proposal essay help providers. We have arrays of expert essay writers who successfully deliver essay help depending on broad ranges of subjects and topics. We provide nursing essay help, MBA essay help, English Essay writing help and law essay help to students from different fields of study. Broad ranges of essay writing services assist us to offer quality contents within a specific time limit.

More CP5603 CP5603 Advanced E Security: Questions & Answers

Q

Cybersecurity and Networking

IT Security Name of the Student: Name of the University: Author Note: 1 IT SECURITY Table of Contents Answer 1 ................................ ................................ ................................ ................................ .... 2 Answer 2 ................... ...

View Answer
Q
icon

We aren't endorsed by this University

MIS 504 Management Information Systems

Task: Is it safe to log onto a wireless network at an airport, library, or other public location? It depends on how vigilant you are. Even the wireless network in your home is vulnerable because radio frequency bands are easy to scan. Both Bluetooth and Wi-Fi networks are susceptible to hacking b ...

View Answer
Q
icon

We aren't endorsed by this University

Medical Interventions

301314 Artificial Intelligence Ethics and Organisations Spring 2021 Dr Jiansheng Huang School of Computer, Data & Mathematical Sciences 1 Lecture 4 AI Ethics Existing Frameworks References Artificial Intelligence: Australia’s Ethics Framework (A Discussion Paper) https://consult.industr ...

View Answer
Q
icon

We aren't endorsed by this University

Legal Debate

301314 Artificial Intelligence Ethics and Organisations Spring 2021 Dr Jiansheng Huang School of Computer, Data & Mathematical Sciences 1 Lecture 5 Data Governance References Yao, M., Zhou, A., & Jia, M. (2018). Applied Artificial Intelligence: A Handbook For Business Leaders USA: TOPBOTS ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?