critical thinking and problem solving skills | My Assignment Tutor

This assignment is designed to help you improve your critical thinking and problem solving skills, as well as your information literacy skills (i.e. the ability to select and organise information and to communicate it effectively and ethically). Requirements 1. Bring Your Own Device (BYOD) Policy Use the Internet to locate BYOD Policy from two different organizations. After reading that information, create your own BYOD policy for your school or place of employment. What restrictions should be enforced? What control should the organization have over the personal devices? Write a short (approximately 750 words) report on your research. 2. Zero-Day Attacks Attacks that exploit previously unknown vulnerabilities are considered some of the most dangerous attacks. Use the Internet to research these attacks. How are the vulnerabilities discovered? What are some of the most recent zero-day attacks? What are the defences against them? Write a short (approximately 750 words) report on your research. 3. Diffie-Hellman Research How does Diffie-Hellman key exchange protocol works? Use the Internet to research this keyexchange protocol. Then visit the website _calc.html to see how values are created. write a short report (approximately 750 words) on your research 4. Hypertext Transport Protocol Secure (HTTPS) Hypertext Transport Protocol Secure (HTTPS) is becoming increasingly more popular as a security protocol for web traffic. Some sites automatically use HTTPS for all transactions (like Google), while others require that users must configure it in their settings. Some argue that HTTPS should be used on all web traffic. What are the advantages of HTTPS? What are its disadvantages? How is it different from HTTP? How must the server be set up for HTTPS transactions? How would it protect you using a public Wi-Fi connection at a local coffee shop? Should all Web traffic be required to use HTTPS? Why or why not? Write a short (approximately 750 words) report on your research. 5. Cryptanalysis of Substitution Ciphers: In this question you learn a classical monoalphabetic (substitution) cryptographic system and are required to cryptanalysis a given cryptogram. In substitution ciphers, a permutation of the alphabet is chosen as the cryptogram of original alphabet. That is, every letter of the plaintext substitutes by corresponding letter in the permuted alphabet.                                                                                               a b c d e f g h i j k l m n o p q r s t u v w x y z                                                                                               c o d k s z r g e l u y a f m v p h i n w t b j q x                                                                                            Figure 1: a possible permutation of English alphabet is one of such permutation, in which letters a, b, c, .. y, z from the plaintext are substituted by corresponding letters c, o, d, …. q, x respectively. Since remembering permutation is not easy, one may employ a keyword and use a table to generate the permuted alphabet. Let CRYPTOGRA-PHY be the keyword. The permuted alphabet can be obtained as follows.  • Choose a 6×5 table/matrix, i.e., a table with 6 rows and 5 columns. • Write down the secret keyword in cells (1, 1), (1, 2),…., one letter in each cell, but skip repeated letters. Figure 2 shows how `CRYPTOGRAPHY’ (as a keyword) written down in the table. • Write alphabet letters (in order) from the first available cell after keyword, but skip all letters that are already written in the table. You will come out with Table 3. • The permuted alphabet, which will be used to generate the cryptogram, can be obtained by simply reading the content of Table 3 in columns order 


Leave a Reply

Your email address will not be published. Required fields are marked *