Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

LZ A2

Assignment 2

Assignment Instructions

For this assignment and any others that require research you must answer in your own words and

cite your references correctly
. A cut-and-paste answer will earn a zero for the entire assignment and may earn a course grade of F for plagiarism.

Part 1: In each of the following scenarios, tell whether there is a violation of confidentiality, integrity, or availability, or some combination of the three. In addition, for each item, write a two- or three-sentence paragraph explaining why your answer is correct.

1. Alex disables Barbara’s router by logging in remotely with the manufacturer’s default password.

2. Mallory builds a WiFi jammer using plans she found on the Internet and jams wireless signals over a large part of her apartment building.

3. Charlene uses a key logger to capture Darla’s banking password.

4. Eve rewrites the magnetic stripe on a gift card to change the amount from $10 to $100.

(Adapted from an exercise in Bishop, Matt,
Introduction to Computer Security.)

Part 2: Using the tool at


, compute the SHA-256 checksum of the MS-Word file that is your work on this assignment so far, or some similar file if you don’t have that one available. Copy the calculated cryptographic hash into Windows Notepad or word processing document to save it temporarily. Now change one character from a capital to a lowercase letter or vice-versa in the original document, re-save, and recompute the the cryptographic hash. Paste the old and new cryptographic hashes into your homework document. Be sure to identify which one is before and which is after.

Do some research and explain in a paragraph or so what a “hash collision” is. Be sure to cite your research.

Part 3: What is a digital signature? And what digital signature algorithm is typically used in cryptocurrencies? Why is it important to always use fresh randomness when computing a digital signature?

Part 4: Generally, a digital signature involves encrypting a cryptographic hash, or digest, generated from the message. What is a hash function? Identify and explain the three properties that make a hash function cryptographic?

Part 5: For each of the following scenarios below, tell what type of encryption is most appropriate and in a sentence, or two explain the reasoning for your choice.

1. Alice wants to send a confidential message to Bill, whom she has never met and who lives in a distant country.

2. Charlie wants to be sure that no one but he can see the financial and medical records he has stored on his computer.

3. David needs a way to check that large computer files stored on corporate servers have not been modified.

4. Eddard uses a “cloud” backup service; he wants to be sure the operators of the service cannot read his files.

5. Frank needs to send a message to George. The message does not need to be confidential, but George must be assured that it actually came from Frank.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

business

INDS 491 Discussion Assignment Instructions The discussions in this course are meant to be collaborative learning experiences that foster a spirit of community and collegiality, but you must also view these as academic assignments with formal requirements. For these discussions, you are required to submit a thread in response to

business

INDS 491 Topic and Research Question Assignment Instructions Overview This assignment is a two-part assignment that gives you the chance to get instructor feedback on your first draft so you can improve it for the second draft and then get more feedback so you can improve it as you begin

Prof Double R

  Directions Initiative Materials Your initiative needs professional materials to support it. Create one or more relevant products that address all of the required elements: Explain how your topic—either the juvenile justice system or allied professionals—relates to the law enforcement branch of the criminal justice system. Include information from one

Business Finance – Accounting Week Four Assignment 7.

Assignment 7: Describe Corporate Governance Top of Form Instructions (CLO:  5, 8)  · Complete Chapter 13:  Mini-case (pp. 559-560).  Complete the above textbook assignment and submit in Brightspace using a Word document.  Length: This assignment must be long enough to completely answer the question.  Bottom of Form

BUSINESS( NO PLAGARISM A+ WORK, ON TIME)

Discussion Tutor 1 IG ( Respond no more than 150 words) Hello Everyone At first glance, this situation looks like a simple “highest bidder wins” scenario. But contract law is not about who offers the most money. It is about whether a binding agreement was formed and when that happened.

A family plan

   A family plans to purchase their first home in 5 years. To afford the monthly payments, the couple estimates they will need a down payment of $150,000 at that time. Assuming they can earn 7% of their investment, how much money will they need to deposit today?

Advance Auditing

Please review the assignment attached. I live in the caribbean region, therefore I prefer information/sources being used to not be that far out of the region.. I am okay with the USA and UK material.  additional information to assist with the assignment and every aspect of MSC level work and

Unit VI GSM

See Attached Unit VI Assignment Strategic Expansion of a Multinational Firm into a New Global Market This assignment measures your mastery of ULOs 4.2, 5.1, and 5.2. This assignment will help you develop strategic decision-making skills crucial for global business management and the successful expansion of multinational enterprises into new

Total Quality Management Discussion 5

This is the problem from week 1 I went with    One issue at the Cook County Courthouse that could benefit from quality improvement is invoice processing and how long it takes vendors to get paid. Cook County uses Net 60 payment terms, while many private companies operate under Net

SCMG201

see attached 5 Assignment 2 – Weeks 3 & 4 Essay Questions SCMG 201 – Principles of Supply Chain Management Enter Student Name Enter Date Chapter 3: Network and Systems Design (Questions 1 through 5) Question 1 Response: Question 2 Response: Question 3 Response: Question 4 Response: Question 5 Response:

DEFM200

see attached Instructions Assignment Directions This assignment assesses  CO-3 [content page]. Read the article by David Garvin (1987),  Eight Dimensions of Quality. Create a PowerPoint presentation consisting of eight slides, excluding the title and reference pages. List four to five main points (using bullet point format) on each main slide.

Business & Finance a homework project . The class is Estate Planning and the project is a memo for Client interview Assignment. a homework project . The class is Estate Planning and the project is a memo for Client interview Assignment.

a homework project . The class is Estate Planning and the project is a memo for Client interview Assignment.  BUSI 354 Memo: Client Interview Assignment Instructions Overview This assignment requires you to use the information you have studied in the first 5 modules of the course in order to identify

week 7

 corporate ethical dilemma or fraud case of their choice  Students will write a comprehensive 12–15 page paper analyzing a major corporate ethical dilemma or fraud case of their choice. The paper should include identification of ethical issues, stakeholders, analysis using at least two ethical frameworks, evaluation of leadership and organizational

BUSINESS( NO PLAGARISM A+ WORK, ON TIME)

Discussion Assignment Week 7 Assignment: Final Project Signature Assignment: This assignment aligns with all course COs. Recommendation: Print complete Assignment to fully read and reference in preparing your paper! Paper outline is included. Prompt: Background For your final project, you are creating your own hypothetical scenario within the following parameters

case up

BUSI 642 Case Analysis: Approaches to Performance Management Assignment Instructions Overview Performance management systems are important because they deal with how employees achieve organizational goals. A key aspect of managing performance is accurately identifying why an employee may not be meeting expectations. This assignment allows you to hone your skills

discussion convey

INDS 491 Discussion Assignment Instructions The discussions in this course are meant to be collaborative learning experiences that foster a spirit of community and collegiality, but you must also view these as academic assignments with formal requirements. For these discussions, you are required to submit a thread in response to

Alternative Energy

  Over the past two centuries, fossil fuels have helped us build the complex industrialized societies we enjoy today. Yet our supplies of conventional fossil fuels are declining. We have responded to this challenge by expanding our search for new sources of fossil fuels. This will eventually lead to us

discussion

BUSI 301 Discussion Assignment Instructions Overview Discussions bring dialogue and communication into our learning experience. Unlike so much of the unsubstantiated opinion we see in the public square and social media, these discussions provide a space for in-depth analysis and application of the topics in our Learn readings and presentations.