Informational Security Assignment | Homework For You

Question 1:
Information security is used to describe the tasks of protecting information in a digital form. To better understand the concepts of information security, you should be familiar with the key characteristics of information, which are expressed in the C.I.A triad characteristics, as shown in the follow figure:
(1)    Explain these three key objectives of information security.
(2)    Give examples of confidentiality, integrity and availability requirements associated with the ATM system in which users provide a bank card for account access and a personal identification number. Homework For You
Question 2
Security experts have discovered that many Internet of Things (IoT) devices including routers, DVRs and cameras could be potentially recruited into botnet because of a malicious software program Mirai, which emerged in 2016 and possibly becomes one of the biggest IoT-based malware threats. Hackers could use such malware to scan insecure Linux-based connected devices, enslave them into a botnet network, and used that to launch massive DDoS attacks to make internet outage, such as  an attack on 20 September 2016 on computer security journalist Brian Krebs’s website, an attack on French web host OVH and the October 2016 Dyn cyberattack.
(1)    Research the Mirai malware to indicate possible issues of vulnerable devices and provide at least two strategies to prevent such botnet from spreading;
(2)    Discuss types of hackers/attackers playing different roles in this case;
(3)    Explain what a DDoS attack is and give basic steps to launch such a DDoS attack in this case study.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Question 3
Integrity protection is used to guard against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.
(1)    Calculate message-digest fingerprints (checksum) for the provided files shattered-1&2.pdf:
(2)    Explain why the Hash algorithm SHA256 is more secure than MD5 and SHA1;
(3)    Based on the derived results in (1), explain why the Google Company announced that they achieved successful SHA-1 collision attack in the early of this year (2017).

Question 4
The earliest and the simplest use of a substitution cipher was by Julius Caesar.
Assume that Alice received the following message “skkz sk glzkx znk zumg vgxze” from Bob, who used Caesar Cipher to let Alice know “meet me after the toga party”. The Vigenère cipher is a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword. It is a form of polyalphabetic substitution.
Please complete the following tasks:
(1)    Research Vigenère cipher and indicate the differences between Caesar and Vigenère ciphers;
(2)    By using Vigenère cipher, choose a key to encrypt the plaintext “meet me after the toga party”;
Plaintext     meet me after the toga party

(3)    Explain an approach that can be used to attack Vigenère cipher. Is it possible to improve the cryptographic algorithm?
Question 5:
RSA is an algorithm to encrypt and decrypt messages. RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described RSA in 1978. A user of RSA creates and then publishes the product of two large prime numbers along with an auxiliary value as their public key. The prime factors must be kept secret. Anyone can use the public key to encrypt a message. However, with currently published methods, if the public key is large enough, only someone with knowledge of the prime factors can feasibly decode the message.
Answer the following questions:
(1)    Explain what category of cryptographic algorithms RSA belongs to.
(2)    Explain how RSA is used to achieve the cryptography (encryption and decryption) and digital signatures.
(3)    Explain the main weakness of digital signatures and how this weakness can be compensated for. Get Networking homework help for you today

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Homework Writing Services
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Public Relations (PR)
They did a good Job, with minor mistake, however will use again
Customer 452621, February 9th, 2020
Business Studies
Great work again!
Customer 454345, May 10th, 2020
Good follow-up task.
Customer 459155, April 7th, 2022
Excellent work.
Customer 462823, April 21st, 2022
Instructions met.
Customer 452441, May 3rd, 2022
Religious studies
Thank you very much. I am going to keep using this service.
Customer 454195, March 30th, 2020
Good response.
Customer 454463, May 5th, 2022
A job well done
Customer 463679, May 9th, 2023
When told to use third person, stick to the narrative point.
Customer 452441, April 25th, 2022
Good job
Customer 456821, November 28th, 2022
good job
Customer 456821, October 8th, 2022
Health Care
Thank you very much!
Customer 454001, February 8th, 2020
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat