University : University of Cenral Lancashire School of Business UniLearnO is not sponsored or endorsed by this college or university.
Country : United Kingdom
Assignment Task :

Learning outcomes assessed by this exam: 

1. Evaluate approaches to the management of IT security.

2. Discuss legal, ethical and social issues relevant to information security.

3. Apply ideas from research and current practice to address problems of IT system security.

 

Section A 

1. Alice want to send Bob a message “secretpassword” online and they want to achieve confidentiality, integrity and authenticity of the message. 

i. Provide the definition of the confidentiality property and a cryptographic method to achieve 

ii. Provide the definition of the integrity property and a cryptographic method to achieve that. 

iii. Provide the definition of the authenticity property and a cryptographic method to achieve that. 

 

(For the above 3 questions use the message format Func(Msg, Key) or Func(Msg) to explain, where any name of a crypto function can be in place of Func, any message in place of Msg, any key in place of Key). 

b. Draw a diagram about the concepts of symmetric key encryption/decryption. 

c. Draw a diagram about the concepts of asymmetric key encryption/decryption. 

d. Draw a diagram about the concepts of the hash function and explain it.

e. Draw a diagram about the concepts of the digital signature and explain it. 

 

Section B 

2. A smart watch sends information about the health information of the owner to a smart phone to analyse. 

a. Explain the main differences (at least two) between passive attacks and active attacks in general. 

b. Provide one example for passive attack and one example for passive attack in this smart watch scenario. 

c. How can a reflection attack happen against an authentication protocol between the smart watch and the smart phone? 

d. How to protect against a reflection attack in this smart watch scenario? 

e. Explain the replay attack against this smart watch scenario and provide a method to protect against it? 

3. SocialEXAM is a social networking website that has users from the EU. After registering and signing in the users can add friends, posting and sharing messages, photos and videos with each other. During the registering phase, the users have to provide personal information such as name, email address, birthday and place of birth, phone number, etc. 

a. SocialEXAM aims at implementing end-to-end accountability requirements. 

i. Name the phases of end-to-end accountability based on the entire data life- cycle in general. Describe in one sentence the purpose of each accountability phase. 

ii. How can each phase be applied to the case of SocialEXAM? You should provide and critically discuss at least three aspects for each phase of accountability. 

iii. Provide at least two data protection regulations/laws or documents that SocialEXAM should follow. 

 

This  IT Computer Science Assignment has been solved by our IT Experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Grace
  • Posted on : May 11th, 2019
  • Downloads : 169

Whatsapp Tap to ChatGet instant assistance