Fill This Form To Receive Instant Help
Homework answers / question archive / System Administration and Security CIS4017-N SAS ICA 2021-22 Introduction This assessment includes two parts: Part I involves a set of short questions on the topic of cryptography and will consider the correctness and completeness of the solutions and your understanding of the concepts and will assess learning outcomes PTS1, PKCS3, PKCS4
System Administration and Security
CIS4017-N SAS ICA 2021-22
This assessment includes two parts:
You must submit original work written by yourself, you must not share your work with your classmates. If you submit multiple attempts, then I will mark the last submission received before the deadline, or if no submissions are received before the deadline, the submission received first after the deadline will be marked. If you hand in late, I will only mark within 7 days and your work will be capped to a pass.
1. Explain the difference between symmetric and asymmetric encryption. Describe a method of asymmetric encryption, and discuss the vulnerabilities of it.
[5 marks]
2. Decrypt OHW PHR XWC CC using the Caesar cipher (shift of 3).
[5 Marks]
3. Assume a public key for RSA encryption given by the pair (143,11). Find the private key corresponding to this pair. ?
[5 marks] 4. Using the pair (143, 11), decode the encrypted message (111 4 88 57 116 67) assuming the letters were represented by ASCII values
(recall that the ASCII values are 65->A, 66->B, … and 97->a, 98->b, …)
[5 marks]
5. Describe in detail the Diffie-Hellman protocol for three parties Alice, Bob and Carol.
[5 Marks]
MGB Ltd. is a company providing security solutions to public services. You are asked to help the MGB Ltd to design a security model for the national defence department - a part of an e-government project on secure information control in managing troops. Assume the armed forces be classified as: {army, navy, air force, marines}, the security levels are typed as: {high, low}.
Your tasks: You should produce a short report (around 500 words) to formalise a Bell Lapadula model to address the confidentiality properties for the specified scenario, and to discuss the strength and weakness of your model.
Hint: You need to describe the model (specify subjects, objects, possible operations – which can be flexible, design your own but need to show your understanding of specifying and applying the BLP model in a real case), the security lattice (a graph can be helpful), the policy and the security properties for the given scenario above.
A conference manage system is a web-based management system which allows researchers submit research papers, the program committee (PC) members (reviewers) to browse papers and contribute reviews, scores and discussion, and release decisions (such as rejection or accept) via the Web. In one arrangement, the conference chair downloads and hosts the appropriate server software. (A good example is easychair:
https://easychair.org/conference)
The system allows users to submit papers, enter reviews & scores and access reviews & scores associated with events (conferences or workshops) regarding to the role of the uses. A user is granted access to the system by providing a role (chair, reviewer, or author) along with a user-id and associated password. Permissible roles for each user are specified at the time a new event is added to the management system. Reviews & scores on papers are initially assigned by chairs (chairs assign papers to reviewers for reviewing, one reviewers can be assigned multiple papers, one paper can be allocated to multiple reviewers). Reviewing are done by reviewers. And a chair can perform any and/or all of these actions, but a chair’s updates can only be changed by the chair. An author, in addition to learning about his or her reviews & grades on individual papers, is entitled to learn the acceptance statistics (but not other papers’ reviews), and the conference program.
Threat model: The adversary is a user who desires to learn the reviews & scores, changes reviews & scores, or prevent others from learning or changing reviews & scores. The adversary has access to the management system and also can read, delete, and/or update network messages in transit. The adversary cannot physically access or run programs on a user’s machine that is running a browser to access the management system. And the adversary can not physically access or run programs on the server hosting the management system.
Your tasks: You are asked to produce a report (1500-2000words) to provide contemplate descriptions of the above Web-based Conference Management System. You should address the following issues:
Hint: Assuming that the manager is not a technical person, craft your explanation in a way that can be explained to a layman and include figures where necessary. You could think about:
[30 marks]
This task involves designing and implementing an Internet-connected secure network for a medium-sized company requiring 500 machines named Smith Logistics, UK. They want to implement a secure network that uses Class C network address with multiple subnets – They have asked you for a price quote as well. But they want to see a packet tracer implementation and simulation results before they commit to purchasing anything.
You can use Packet tracer/Opnet/Omnet++ for the implementation and security measures. The implementation of the network should consist of core, distribution and access layer.
It should use a minimum of two routers at the distribution and a further 2-4 for the core layer. All router interfaces must be tested for the correct subnet operations.
Your tasks: You should write a report with the appropriate design and implementation solution (2500 words max, but flexible) documenting all that you have done, including how the network is set up. Use the tasks below as a guideline to write.
Hints: Design the logical diagram. You can ignore the device location in a logical design. Use Visio or any drawing tool for the diagram. Don't forget to label the diagram core, access and distribution layer.
Hints: Research on the costs of servers (hardware and software), switches, workstations, cables, etc.
Hints: Harvard referencing can be used and make sure the format is fully followed.
You should submit your report as a PDF document via Blackboard by the deadline of 1600hrs 11 May 2021.
Advice and assistance
Consult the module tutors during a scheduled session or email the module tutors.
The criteria below is necessarily incomplete as we cannot anticipate every possible ICA submission.
Grade Part I (25)
Learning Outcomes to be assessed: RKCS3, PKCS4
Q1 (5) |
Understanding of the concepts |
Q2 (5) |
correctness |
Q3 (5) |
5 marks for correct solutions of the private key and details provided; if correct p is given: 2 marks; if correct q is given: 2 marks. |
Q4 (5) |
5 marks for correct decrypt message and details provided; 4 marks if understanding shown but final computation is incorrect, 1 mark for one correct part of the message. |
Q5 (5) |
Correctness and completeness |
Grade Part II : scenario I (20) Learning Outcomes to be assessed: PTS1, PTS2, PKCS3, PKCS5, PKCS6 |
|
State machine (5) |
Sound description of the model |
Security lattice (5) |
Correct description on the partial ordering of the security labels |
Security properties (5) |
Reasonability and completeness of the description |
Strength and weakness (3) |
Reasonability and completeness of the description |
Writing and reference (2) |
|
Grade Part II: scenario II (25) Learning Outcomes to be assessed: PTS1, PTS2, PKCS3, PKCS5, PKCS6, PKCS7 |
|
70-100%
|
Excellent
[SYNTHESIS] Demonstrate a broad understanding of the professional, ethical and legal compliance considerations around network security, and an excellent understanding of modern information and network security properties and system threat & vulnerabilities is demonstrated with excellent links to the specified scenario. There is clear evidence of work beyond taught material.
[DESIGN] An excellent analysis of security protection techniques and their application is demonstrated in relation to the specified scenario. There is clear evidence of work beyond taught material.
[WRITE] A very clear and readable report, with excellent structuring, good use of grammar and referencing. Document submitted as PDF.
|
60-69%
|
Substantially correct/appropriate (based on taught material & module requirements)
[SYNTHESIS] Demonstrate a good understanding of the professional, ethical and legal compliance considerations around network security, a very good understanding of modern information and network security properties and threats is demonstrated with clear linkage to the specified scenario.
[DESIGN] A very good analysis of security protection techniques and their application is demonstrated in relation to the specified scenario. |
|
[WRITE] A clear and readable report, with appropriate structuring and referencing. Document submitted as PDF.
|
50-59%
|
Minor errors/omissions/issues
[SYNTHESIS] Demonstrate a reasonable understanding of the professional, ethical and legal compliance considerations around network security, and a generally/mostly good understanding of modern information and network security properties and threats is demonstrated with clear linkage to the specified scenario.
[DESIGN] A generally/mostly good analysis of security protection techniques and their application is demonstrated in relation to the specified scenario/task.
[WRITE] A clear and readable report, with minor errors in writing, structure or referencing. Document submitted as PDF.
|
40-49%
|
Major errors/omissions/issues
[SYNTHESIS] Demonstrate a limited understanding of the professional, ethical and legal compliance considerations around network security, an a limited understanding of modern information and network security properties and threats is demonstrated and/or limited linkage to the specified scenario.
[DESIGN] A limited analysis of security protection techniques and their application is demonstrated in relation to the specified scenario/task.
[WRITE] A report, with major issues of writing, structure or referencing. Document submitted as PDF.
|
30-39%
|
Unsatisfactory
[SYNTHESIS] Demonstrate a vert limited understanding of the professional, ethical and legal compliance considerations around network security, and a very limited understanding of modern information and network security properties and threats is demonstrated.
[DESIGN] A very limited analysis of security protection techniques and their application is demonstrated.
[WRITE] A report that is difficult to read or comprehend but includes some attempt at structure and referencing OR document is not submitted as a PDF.
|
0-29%
|
Inadequate
[SYNTHESIS] Demonstrate little understanding of the professional, ethical |
|
and legal compliance considerations around network security, and little to nothing demonstrated in relation to modern information and network security properties and threats.
[DESIGN] Little to no analysis of security protection techniques and their application.
[DESIGN] A report that is very difficult to read and comprehend, and makes no attempt at referencing.
|
Grade Part II: scenario III (30) Learning Outcomes to be assessed: PTS2 , PKCS3 and PKCS5 |
|
Task 1 (12)
|
Network Design and Implementation (6 marks); IP and subnetting (6 marks);
|
Task 2 (8) |
Discussion of the relevant protocols and hardware used to design this network and How the protocols meet the requirements. |
Task 3 (7) |
Cost of implementation |
Task 4 (3) |
Professional writing and good use of reference. |