WHAT IS THE C I A OF SECURITY

Qualified Writers
Rated 4.9/5 based on 2480 reviews

100% Plagiarism Free & Custom Written - Tailored to Your Instructions

Instructions

 

  • The submission file must be in the format of PDF.
  • Submission of the PDF file must be made via the online submission system on  the course webpage.

 

Task 1 (3 marks)

 

What is the C.I.A.of security? Use examples to contrast security threats and attacks?

 

Task  2 (3 marks)

 

List 5 general design decisions that have to be made when constructing secure systems..

 

Task 3 (8 marks)

 

The smallest possible value for the modulus   n  for which the RSA algorithm works are

=11, =3   .  Use the most simplest example of RSA to do encryption. We would let

 

A  B   C   D  E   F   G  H  I    J    K  L   M  N  O  P   Q  R   S   T   U  V  W  X  Y  Z

2   3   4   5   6   7   8   9   10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

 

Thus the plaintext message “HELLOWORD” would be represented by the set of integers

 

{9, 6, 13,13, 16, 24, 16, 19, 13, 5 }   . Using the table above, please find ciphertext integers.

 

Task 4 (2 marks)

 

Select a topic from the following list for your assignment 3, which is a reading research project. Write an objective of this reading research project (not more than 30 words)

 

  1. Compare and Contrast the OpenSSL and GNU OpenGPG.
  1. Understanding the Kerberos System and its Authentication Protocols
  1. Generating Digital Certificates using OpenSSL

 

4.   On the security and authentication of Web sites

Price: £109

100% Plagiarism Free & Custom Written - Tailored to Your Instructions