Chat with us, powered by LiveChat You have been working long hours and h - Writeedu

You have been working long hours and h

[ Cyber Attack & Ethical Hacking

01a1] Unit 1 Assignment 1

Week 2 –

[u01d1] Unit 1 Discussion 1

· Applying Encryption and Hashing Algorithms for Secure Communications (Assignment)
Instructions

To demonstrate your understanding of core concepts and procedures presented in this unit, you are required to complete the Applying Encryption and Hashing Algorithms for Secure Communications lab, linked in the course room.

1. Explain why hash values are an important part of performing a forensic investigation.

2. Do hash values typically change if data is modified? Explain why or why not.

3. List a method of securing message integrity during e-mail communications without encrypting the e-mail.

4. Explain the purpose of the –e switch in the GnuPG command.

5. Compare and contrast MD5sum and SHA1sum hashing algorithms.

6. During the lab, several cryptographic algorithms were used. Name them.

7. Explain what is required to decrypt an encrypted message.

8. Explain the purpose of the –d switch in the GnuPG command.

9. List some ways to create entropy in a GnuPG encryption key.

Refer to the Applying Encryption and Hashing Algorithms for Secure Communications scoring guide to ensure that your work meets the grading criteria for this assignment.

Submit your assignment by midnight Sunday (CST).

Submission Requirements

· Written communication: Writing should be clear and well organized, with no technical writing errors, as expected of a business professional.

· Format: Typed, double-spaced lines.

· Font: Times New Roman, 12 points.

[u02a2] Unit 2 Assignment 2
Web-Based Attacks (Assignment)
Introduction

Cybercriminals have orchestrated a hybrid attack on your city’s municipal website. The Federal Bureau of Investigation (FBI) has asked that the municipal website be taken offline and that infrastructure that supports the website be isolated until a thorough investigation has been completed. You have been asked to create a PowerPoint presentation for senior management to address the problem.

Instructions

In your presentation, you will need to:

1. Describe different types of attack strategies attackers may employ.

1. Evaluate mitigation strategies for each type of attack.

1. Recommend a course of action for addressing the Web attack.

1. Support your presentation with a minimum of four references.

1. Communicate in a manner that is highly professional and consistent with expectations for professionals in the field of information technology.

Your presentation must:

. Include a minimum of 16–18 slides, along with extensive speaker notes (see Submission Requirements, below).

. Address at least eight of the Web-based attack strategies listed below:

. Cross-site scripting (XSS) attack.

. Cross-site request forgery (CSRF).

. SQL injection.

. Code injection.

. Command injection.

. Parameter tampering.

. Cookie poisoning.

. Buffer overflow.

. Cookie snooping.

. DMZ protocol attack.

. Zero-day attack.

. Authentication hijacking.

. Log tampering.

. Directory traversal.

. Cryptographic interception.

. URL interpretation.

. Impersonation attack.

Structure your presentation as follows:

· Title (one slide).

· Introduction (two slides): Identify the problem and list the Web-attack strategies you have chosen to address.

· Main slides (a minimum of eight slides): On each slide, describe one of the possible attack strategies and analyze possible mitigation strategies.

· Recommended course of action (1–2 slides).

· References on the final slide (a minimum of one slide).

Tips for your slide presentation:

· Use the speaker notes to include the information you want to share with your audience. The speaker notes must be coordinated with the information on the slides.

· Be sure to provide APA-formatted citations for your sources.

· Be creative. You can add audio to the presentation if you choose to do so; however, it is not required.

Capella academic integrity standards must be strictly followed.

Submission Requirements

· PowerPoint presentation: Should be clear and well organized, with no technical writing errors, as expected of a business professional.

· Number of slides: 16–18 slides. Information in the slides should be in bulleted list format with a minimum of four bullets per slide.

· Speaker notes: Include a minimum of 100–150 words for each main slide. The information in the speaker notes must contain at least one reference per slide. Double-spaced the lines.

· References: Include a minimum of four recent, peer-reviewed references.

· APA style: References and citations should be formatted using current APA style.

· Font for slides: Times New Roman, 28–32 points.

· Font for speaker notes: Times New Roman, 12 points.

[u02d1] Unit 2 Discussion 1
Cryptography and Vulnerability Management (1-page Discussion)

Introduction

Encryption is used to provide confidentiality, integrity, and non-repudiation, to name a few. Three main types of encryption are symmetric encryption, asymmetric encryption, and hashing algorithms. There are advantages associated with each method and they are often combined to provide the most benefit. Although encryption can be used to increase security, it also requires processing power to perform. Security professionals must carefully balance the cost of encryption versus the risk of not encrypting to determine the most appropriate approach for their environment.

Instructions

You have been working long hours and have been taking work home on an external USB drive. Much of the work you do involves proprietary company information. You place your USB drive in your pocket and head out. On the way to work, you stop by a restaurant to grab a quick bite to eat before another long day. When you get to work you realize the USB drive is no longer in your pocket. You carefully check your car and still cannot find it. You realize you must have dropped it earlier. You go back to the restaurant and the USB drive is not there. The data on the USB drive was encrypted. Do you need to be concerned with losing the USB drive? Does the type of encryption used matter; why or why not?

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now