Securing Higher Grades Costing Your Pocket? FLAT 25% OFF on all orders
loader

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

16 Pages
CSC72005 Securing Networks

Questions: In this assignment, you will perform necessary setup to install,configure and troubleshoot an SME network You must successfully implement the network on eNSP (or similar) network simulatio ...

Course

CSC72005

Type

Programming

Subject

Networking

University

Southern Cross University

Season

Spring

99 Pages
COIT11238 Networked Infrastructure Foundations

Answer: Instructions While it should not be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard form ...

Course

COIT11238

Type

Home Work

Subject

Networking

University

Central Queensland University

Season

Spring

9 Pages
IFN507 Network Systems

Question : 1. Problem Solving : Virtual Machine What you need for this task? A computer with Internet access. What to do? Sub-Task 1): Set up a Virtual Machine (VM), e.g., using Oracle&rsq ...

Course

IFN507

Subject

Networking

University

Queensland University of Technology

17 Pages
Hexadecimal Decimal And Binary

[VU22334VIC] [VU21988- ASSESSMENT TASK 2-v1.3] [28 Feb 2022] Page 1of4 22334VIC -Certificate IV in Cyber Security VU21988 -Utilise basic network concepts and protocols required in cyber security As ...

Course

22334VIC

Subject

Networking

University

Victoria University

Season

Spring

COSC2651 Security in Computing and IT

Question

Answered

Question:

Task 1

Using your skills learnt in Practical 01, select a recent (not older than three months) vulnerability from the National Vulnerability Database and analyse it from the following aspects:

  1. Provide a detailed description of the vulnerability. (Include the NVD url link)

  2. Impact (Access Vector, Complexity, Authentication, Impact type etc) including CVSS Score version 2 and version 3.

  3. Explain the purpose of using CVSS scores.

  4. Proposed Solution (Screenshot Accepted. Must also include URL of vendor solution)

  5. Examine the ASD’s Strategies to Mitigate Cyber Security Incidents at: https://www.cyber.gov.au/acsc/view-all-content/publications/strategies-mitigate-cyber-security-incidents

Identify which strategies mitigate the vulnerability? As part of your solution you must provide a valid explanation of how each chosen strategy will be effective. You must provide at least two strategies. In the event that only one is applicable, you must clearly explain why all other strategies are not effective.

Task 2

Search a number of antivirus companies’ websites (e.g. Symantec, McAfee, Kaspersky, F-Secure, AVG, Bit Defender, Webroot, ESET, G-Data, Avira, Lavasoft, Microsoft etc.). Find at least four sites that publish malware listings, and compare their malware lists.

  1. List the four sites. (include URL)

  2. Discuss how descriptive and informative the sites are. (include screenshots, Compare at least 4 key criteria across the sites: Risk Criticality, Date, Recommendation, Description)

  3. Try to compare the malware listings (in terms of completeness of their malware listings and how up to date their listings are). Explain the problems with attempting to compare the malware listings of each site in this way.

  4. Given the differences in the way each site presents this information, which site would you recommend and why?

Task 3

Select two recent, different threats from an antivirus company’s database. Describe for each:

  1. The descriptions and URL references to the two threats
  2. How the threat spread (two or more attack strategies)
  3. The targets of malicious activity (information, resource etc.)
  4. The ways of hiding inside the victim’s computer (avoids detection)
  5. At least two preventative measures the user could take to avoid the threat.

Task 4

In a given system, passwords are required to be 8 to 12 characters in length.

Each character can be any alphanumeric character and passwords are case sensitive.

For authentication matching purposes, all passwords are hashed and stored in a password file.

The password file contains 1024 password hash values, with each belonging to a single user in the system.

Suppose an intruder has gotten access to the password file and the intruder has a dictionary containing 216 common passwords and there is a 6.25% chance that any given password is in that dictionary.

In addition the intruder has a computer that can generate and compare 109 hashes per second.

  1. How many different passwords are possible? What if the password was not case sensitive? Explain your answer and show all calculations and results.

  2. How many years would it take to check every possible valid password combination (in both cases above)?

  3. Suppose the intruder wants to recover the password of Bill, who is a user in the system. Right now the intruder only has Bill’s password hash value in the password file. Using the intruder’s dictionary, what is the number of hash operations that the intruder expects to compute in order to find out Bill’s password, given the 6.25% chance that any given password is in the dictionary as mentioned above? Assuming that the intruder has a computer which can generate 109 hashes per second, how long would this take?Explain your answer and show all calculations and results.

  4. What is the probability that at least one of the 1024 passwords kept in the system actually exists in the intruder’s dictionary?

Task 5

The delays and uncertainty over the recent US election have highlighted areas where security and technology both aid and limit the effectiveness of such systems.

Investigate various electronic election voting systems, their benefits and their various issues.

Contrast this against the pre-existing manual (in person and postal) voting processes and how these issues are addressed.

As part of your investigation, determine the types of attacks and security limitations that each is susceptible to. How do poorer countries without infrastructure deal with these issues?

How are issues such as non-repudiation, duplicate voting and other types of voter fraud detected and prevented in manual voting? What mechanisms and technologies are available to deal with these issues in electronic voting systems?

COSC2651 Security in Computing and IT

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

21 More Pages to Come in This Document. Get access to the complete answer.

More COSC2651 COSC2651 Security in Computing and IT: Questions & Answers

Q
icon

We aren't endorsed by this University

CSC72005 Securing Networks

Questions: In this assignment, you will perform necessary setup to install,configure and troubleshoot an SME network You must successfully implement the network on eNSP (or similar) network simulation software and perform important steps to manage the network security configuration. In particular, ...

View Answer
Q
icon

We aren't endorsed by this University

COIT11238 Networked Infrastructure Foundations

Answer: Instructions While it should not be necessary to use literature/online resources to complete this assignment, please ensure you cite and reference any such materials using the Harvard format.  What terminology mistakes has the user made? What terminology should they have used? You ...

View Answer
Q
icon

We aren't endorsed by this University

IFN507 Network Systems

Question : 1. Problem Solving : Virtual Machine What you need for this task? A computer with Internet access. What to do? Sub-Task 1): Set up a Virtual Machine (VM), e.g., using Oracle’s VirtualBox or other VM apps, and show it works. Sub-Task 2): Set up a small network ...

View Answer
Q
icon

We aren't endorsed by this University

Hexadecimal Decimal And Binary

[VU22334VIC] [VU21988- ASSESSMENT TASK 2-v1.3] [28 Feb 2022] Page 1of4 22334VIC -Certificate IV in Cyber Security VU21988 -Utilise basic network concepts and protocols required in cyber security Assessment Task 2 –Applied Knowledge Assessment -Numbering systems & subnetting Student Name ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.io then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile Chat Now
Have any Query?
close
Subtraction Payment required!

Only one step away from your solution of order no.