Free Samples
COIT20262 Advanced Network Security
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
COIT20262 Advanced Network Security
0 Download5 Pages / 1,038 Words
Course Code: COIT20262
University: Central Queensland University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Question:
This is an individual assignment, and it is expected students answer the questions themselves.
Discussion of approaches to solving questions is allowed (and encouraged), however each student should develop and write-up their own answers. See CQUniversity resources on Referencing and Plagiarism. Guidelines for this assignment include:
Do not exchange files (reports, captures, diagrams) with other students.
Complete tasks with virtnet yourself – do not use results from another student.
Draw your own diagrams. Do not use diagrams from other sources (Internet, textbooks) or from other students.
Write your own explanations. In some cases, students may arrive at the same numerical answer, however their explanation of the answer should always be their own.
Do not copy text from websites or textbooks. During research you should read and understand what others have written, and then write in your own words.
Perform the tasks using the correct values listed in the question and using the correct file names.
Answer:
Part (d)
Information
Answer
Packet number from normal-student.pcap that contains the normal students’ password
Packet Number – 52
Packet number from normal-student.pcap in which the server originally sends the cookie to the browser
Packet Number -36
Last 4 HEX digits of the id_hash in the cookie (give the value of the last 4 digits, not the packet number)
a9 fe ff 42
Packet number from malicious-student.pcap that contains the normal student’s grade for coit20262.
Packet Number -15
Packet number from malicious-student.pcap in which the client originally sends the stolen cookie
Packet Number -26
Part (e)
The Merkle tree algorithm is very effective algorithm to find the hash ID because it has SHA hash function to send the messages to the receiver and it also determines the protocol specifications.
Part (f)
Generally, the Hash functions are used in grading web applications and it used to provide the security to shows the all the applications based on the information security. It has the lot of purposes like data security applications, digital and validation signatures and message integrity checks.
Part (g)
The control of hash ID basically having the inadequacy and weakness. The apparent lack of hash work that considers two records to have a close procedure which limit is considered as cryptographically broken, in light of the way in which that computerized fingerprints made with it can be made and can’t be trusted. Precisely when, attackers are could make the basic programming refreshment which could be seen and executed by a re – establish structure that is utilized to fortify the framework that improved by the checking the electronic scores.
Part (h)
In the event that clients are send the secret key in the plaintext going through browser to server, this procedure is does not gives the security. Along these lines, we needs to utilize the Hash function since it utilizes the more strong passwords by executing the uncommon, blended and computerized characters. It safely stores the client’s passwords.
Part (i)
Creating Cookies
Generally, the browsers are saves the cookies. Then, cookie is sent with requests made to the same server inside a cookie HTTP header.
Set-Cookie:
Cookies in web browsers
To identify the cookies by using the below steps.
First we will go to Chrome Developer Tools.
After, Choose Menu → Tools → Developer Tools.
Go to “Resources” tab.
Finally, Open “Cookies” section.
Cryptography
Summary files are attached here.
Summary Signature Files are attached here (Kotenko, 2012).
Security Issues
Each block of AES uses the unaltered key and it only encrypt the 128 data bits. It is shown below
The Initialization vector utilized is a discretionary number in like manner called nonce which when joined with an unclear key makes the fundamental information totally confused. The information when first XOR with plaintext information, it randomizes it. Extra confound key encryption will make it stunningly harder to inspect. Thusly IV basically require not be puzzle since the encryption with a wrong key gives the required inquiry. Besides the information inside the blended record can’t be assessed in AES-CBC as it goes into different rounds of encryption.
Ransomware Research
Ransomware Framework
Ransomware is a sort of malware that undermines to destroy or deny access to data once it has expected control over your PC. The attacker demands liberate, generally through advanced cash, remembering the true objective to re – build up your passageway to the records. Inferable from the creating example of ransomware ambushes, activities and their data have ended up being weaker against cybercriminals in the continuous years. Accordingly, it is basic to grapple corporate framework endpoints through front line endpoint security programming to evade an extensive variety of computerized ambushes.
How Ransomware Works
It is fundamental to know how Ransomware takes control of your PC. Basically, ransomware strikes connect through Phishing Emails that cover as indispensable records or programming invigorates. Once the setback opens the email and downloads the substance, the malware presents itself on the PC and starts coming up short immediately without the data of the customer. Latest sorts of ransomware malware, it make usage of the security feeble spots to assault the PCs without hoping to trap customers. The cheated PC archives are shot and denied get to using a logical key known just to the aggressor. Generally, the casualty’s screen is instigated with a message communicating that their archives are closed off and will simply end up accessible if the casualty trades the result through untraceable Bitcoin portion. In the continuous years, Ransomware ambushes have been engaged at corporate levels. It is imperative to grapple all the remote contraptions, for instance, PCs, mobile phones and distinctive remote devices using endpoint security programming with a particular ultimate objective to successfully shield ambushes from attacking your framework.
Technical Details for Ransomware
There are two standard sorts of ransomware routinely observed today:
Crypto-ransomware will encode records on a PC, basically ‘scrambling’ the report substance so the client can’t get to it without a translating key that can exactly ‘unscramble’ it.
“Police-themed” ransomware will effort to cover their activities by showing up, clearly, to be a notice from a zone manage endorsing master, and indisputably to have materials that are wrongfully downloaded, affront or generally things (Gallo, 2016).
Suggestions
Suggestions for keep the ransomware. These are,
Use restored Operating System.
Try not to exhibit programming or give it valid central focuses beside in case you know unequivocally what it is and what it does.
Introduce antivirus programming, which separates destructive undertakings like ransomware as they arrive, and whitelisting programming, which keeps unapproved applications from executing in any case.
What’s more, obviously, back up your reports, every once in a while and much of the time. It can make the underhandedness caused by one essentially less fundamental.
Stay up with the most recent and settled.
Except on the off chance that you are totally aware of what you are doing, don’t present any item or give it legitimate advantages.
Back up your reports, reliably and normally.
References
Gallo, A. (2016). Ransomware. [S.l.]: O’Reilly Media, Inc.
Huang, S. (2014). Network security. [Place of publication not identified]: Springer.
Kotenko, I. (2012). Computer network security. Berlin: Springer.
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 5 pages
PAY 3 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2021). Advanced Network Security. Retrieved from https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/place-of-publication-not-identified.html.
“Advanced Network Security.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/place-of-publication-not-identified.html.
My Assignment Help (2021) Advanced Network Security [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/place-of-publication-not-identified.html[Accessed 18 December 2021].
My Assignment Help. ‘Advanced Network Security’ (My Assignment Help, 2021)
My Assignment Help. Advanced Network Security [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/coit20262-advanced-network-security/place-of-publication-not-identified.html.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
Often times , great research papers go unseen only because the cover page was not drafted properly. Research paper cover page also carries weightage. We help drat excellent formatted research paper cover page along with the research paper. All the details like title, name of researcher, course information and the name of supervisor are put on the page. So when you place order for research paper with us , you get everything from free cover page to free title, free bibliography, free editing and proofreading along with free referencing. What are you waiting for?. Place order now.
Latest Management Samples
div#loaddata .card img {max-width: 100%;
}
MPM755 Building Success In Commerce
Download :
0 | Pages :
9
Course Code: MPM755
University: Deakin University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More
SNM660 Evidence Based Practice
Download :
0 | Pages :
8
Course Code: SNM660
University: The University Of Sheffield
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration
BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20
Course Code: BSBHRM513
University: Tafe NSW
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More
MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5
Course Code: MKT2031
University: University Of Northampton
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration
MN506 System Management
Download :
0 | Pages :
7
Course Code: MN506
University: Melbourne Institute Of Technology
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology
Next