代做COMP SCI 1500 - Cyber Security Assignment 5帮做Python编程

Assignment 5: Cyber Security Concepts

Course Name: COMP SCI 1500 - Cyber Security

Assessment Component: Individual Assessment

Due Date: Week 11, 23:59pm Monday 14 October 2024

Submission: Portable Document Format (.pdf) or Word document (.docx/.doc) on MyUni

The report of this assignment should be in A4-size page with Times New Roman or similar font, size 12. The first page of the report should include your full name and student ID.

How to Submit: The activity solution will be submitted via an upload facility created for this activity on Canvas.

Question 1 - Cryptography ( 8 marks)

1.  Study the three encryption methods given below and their weaknesses.

2.  Solve the following three exercises, in each case your task is to recover the plaintext.

•    Mono-alphabetic substitution: You are given a ciphertext “ex1.enc” encrypted using the mono- alphabetic substitution method. Hint: the key is a mapping of 26 plaintext English characters to 26 ciphertext English characters.

•    Poly-alphabetic shift (Vigenère cipher): You are given a ciphertext “ex2.enc” encrypted using the poly-alphabetic shift method. Hint: the key consists of 4 English characters, and the plaintext contains the name of the day of the week.

•    Textbook RSA: You are given (1) Python3 script “textbook_rsa.py” which contains functions related to the Textbook RSA encryption scheme (2) RSA public key “rsa_key.pub” (3) Ciphertext “ex3.enc” encrypted using the given RSA public key. Hint: the plaintext consists of only 3 English characters.

3.  Write a report on how you solved those exercises and the weaknesses you exploited. If you

cannot recover the plaintext, explain what method you have tried and why you couldn't recover them (for example, if it is infeasible due to computing resources). A report that contains only plaintexts without further explanation will not be marked.

4.  Tips about how I would go about doing this activity: I would familiarize myself with frequency

analysis and cryptanalysis based on the validity of English words. Study the given Python script and write some scripts to check your understanding regarding the rsa_keygen(), rsa_encrypt() and rsa_decrypt() functions – you may need to use some of this code. Then, solve the exercises. Finally, explain how you tried to solve those exercises, what methods or techniques you used, plaintexts (and keys, if possible) that you recovered. Include the information in the report and submit to Canvas.

Please note that answers copied from online or without adequate explanation will not receive any points.

Question 2 - Common Vulnerability Scoring System ( 3 marks)

The Common Vulnerability Scoring System is a method of objectively scoring security vulnerabilities so that their severity can be assessed, understood and compared.

Read this explanation of CVSS -> https://www.first.org/cvss/specification-document

Given the following hypothetical vulnerability, apply the CVSS v.3.1 or v.4 scoring system to get a CVSS base score and CVSS base vector string. Referencing the description of the hypothetical vulnerability below, describe why you have chosen each of the fields in the vector string.

A remote vulnerability has been discovered in the BitMessage desktop messaging application which allows an unauthenticated person to delete a BitMessage message of their victim. The attacker can trigger this vulnerability by sending a BitMessage message to the victim containing the text 'deletemessage?message=2' where '2' is the message ID. When the desktop application receives this message any message matching the specified message ID is deleted. There is no indication to the victim that anything has happened and the application  continues to operate, the victims message just disappears permanently.

Hint: You might want make use of this link to generate the base score and vector string-->

https://www.first.org/cvss/calculator/3.1

https://www.first.org/cvss/calculator/4.0

Question 3 - Risk Management (2 marks)

a) The risk of security incidents can be managed in one of four different ways. Risk can be mitigated, transferred, avoided or accepted. Describe what each of these strategies entail and describe how the risk is modified by applying each approach.

b) The NIST Cyber Security Management Framework segments security management activities into 5 functions:

Identify, Protect, Detect, Respond and Recover

Describe each of these functions, their purpose and describe an example of a security activity typically performed for each of these functions.

Question 4 - General Cybersecurity/Cryptography Knowledge (2 marks)

a) Authentication and authorization are often confused. What is the difference between the two?

b) What is the purpose of a firewall and how does it reduce the risk of a cyber-attack?

c) Describe the following concepts and their effect in terms of the C.I.A.triad.

•    Message Authentication Code (MAC)

•    Digital Signature

•    Birthday Paradox

d) Can a traditional antivirus prevent zero-day attacks? Why or why not? In your answer consider how an antivirus signature works and how they are constructed.





热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图