BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Tutorial #3 Total Marks: 30 (6%) Submit your answers to the following questions by Week-7 Friday 5:00PM....

1 answer below »
Already have attached all the question and picture that they asked for . please kindly explain it


BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Tutorial #3 Total Marks: 30 (6%) Submit your answers to the following questions by Week-7 Friday 5:00PM. Late submissions will incur 5% deduction with each passing day till Week-8 Friday 5:00PM, after which no submissions will be accepted. Warning: Plagiarism is a serious ethical offense with dire consequences. Do not copy and paste from your textbook, online resources, or your friend’s work. Cite and provide reference (Harvard Style) to the original work where applicable. Questions: Q. #1: Go to page 195 of your e-textbook*, explain Figure 5-2 in the context of Man-in-the- Middle attack in your own words. (10 Marks) Q. #2: Go to page 200 of your e-textbook*, explain Figure 5-4 in the context of DNS poisoning. (10 Marks) Q. #3: Go to page 203 of your e-textbook*, explain Figure 5-5 in the context of Denial of Service attack. (10 Marks) * Ciampa, M. (2018), Security + Guide to network security fundamentals 6th edn. Cengage Learning, United States. Get access to your e-textbook on Moodle by going to Information Security unit > E-text tile. SE/CIAMPA, CompTIA Security+ Guide to Network Security Fundamentals, 6th Edition ISBN-978-1-337-28878-1 ©20XX Designer: XXX Text & Cover printer: Quad Graphics Binding: PB Trim: 7.375 x 9.125" CMYK Security+ Guide to Network Security Fundamentals To register or access your online learning solution or purchase materials for your course, visit www.cengagebrain.com. Security+ Guide to Network Security Fundamentals INFORMATION SECURITY Sixth Edition Mark Ciampa Sixth Edition CIAMPA Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 CompTIA Security+ SY0-501 Exam Objectives Security+ Exam Domain/Objectives Chapter Bloom’s Taxonomy 1.0: Threats, Attacks, and Vulnerabilities 1.1 Given a scenario, analyze indicators of compromise and determine the type of malware. 2 Analyze 1.2 Compare and contrast types of attacks. 2 3 5 8 11 15 Understand Analyze Understand Apply/Understand Create Apply 1.3 Explain threat actor types and attributes. 1 Analyze/Apply 1.4 Explain penetration testing concepts. 13 Apply 1.5 Explain vulnerability scanning concepts. 13 Apply 1.6 Explain the impact associated with types of vulnerabilities. 1 3 4 5 9 10 Understand Understand Understand Understand Understand Understand 2.0: Technologies and Tools 2.1 Install and configure network components, both hardware- and software-based, to support organizational security. 4 6 7 8 Apply Analyze Apply Analyze/Evaluate 2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization. 8 13 14 Evaluate Analyze/Evaluate Evaluate 2.3 Given a scenario, troubleshoot common security issues. 15 Analyze 2.4 Given a scenario, analyze and interpret output from security technologies. 6 7 9 Analyze Analyze Analyze 2.5 Given a scenario, deploy mobile devices securely. 8 10 11 Apply/Evaluate Analyze/Create Analyze 2.6 Given a scenario, implement secure protocols. 4 5 Apply Analyze 3.0: Architecture and Design 3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides. 1 15 Analyze Understand 3.2 Given a scenario, implement secure network architecture concepts. 6 7 8 13 Analyze Apply Apply/Evaluate Apply 88781_ifc_hr.indd 2 8/9/17 3:41 PM Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Australia • Brazil • Mexico • Singapore • United Kingdom • United States INFORMATION SECURITY Mark Ciampa, Ph.D. Sixth Edition SECURITY+ GUIDE TO NETWORK SECURITY CompTIA ® FUNDAMENTALS 88781_fm_hr_i-xxvi.indd 1 8/16/17 7:00 PM Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 © 2018, 2015 Cengage Learning Unless otherwise noted, all content is © Cengage. Security+ Guide to Network Security Fundamentals, Sixth Edition Mark Ciampa SVP, GM Skills: Jonathan Lau Product Team Manager: Kristin McNary Associate Product Manager: Amy Savino Executive Director of Development: Marah Bellegarde Senior Product Development Manager: Leigh Hefferon Senior Content Developer: Michelle Ruelos Cannistraci Product Assistant: Jake Toth Marketing Director: Michelle McTighe Production Director: Patty Stephan Senior Content Project Manager: Brooke Greenhouse Art Director: Diana Graham Cover image(s): iStockPhoto.com/ supernitram Printed in the United States of America Print Number: 01 Print Year: 2017 ALL RIGHTS RESERVED. No part of this work covered by the copy- right herein may be reproduced or distributed in any form or by any means, except as permitted by U.S. copyright law, without the prior written permission of the copyright owner. Library of Congress Control Number: 2017950178 ISBN: 978-1-337-28878-1 LLF ISBN: 978-1-337-68585-6 Notice to the Reader Publisher does not warrant or guarantee any of the products described herein or perform any independent analysis in connection with any of the product information contained herein. Publisher does not assume, and expressly disclaims, any obligation to obtain and include information other than that provided to it by the manufacturer. The reader is expressly warned to consider and adopt all safety precautions that might be indicated by the activities described herein and to avoid all potential hazards. By following the instructions contained herein, the reader willingly assumes all risks in connection with such instructions. The publisher makes no representations or warranties of any kind, including but not limited to, the warranties of fitness for particular purpose or merchantability, nor are any such representations implied with respect to the material set forth herein, and the publisher takes no responsibility with respect to such material. The publisher shall not be liable for any special, consequential, or exemplary damages resulting, in whole or part, from the readers’ use of, or reliance upon, this material. Cengage 20 Channel Center Street Boston, MA 02210 USA Cengage is a leading provider of customized learning solutions with employees residing in nearly 40 different countries and sales in more than 125 countries around the world. Find your local representative at www.cengage.com. Cengage products are represented in Canada by Nelson Education, Ltd. To learn more about Cengage platforms and services, visit www.cengage.com Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions. Further permissions questions can be e-mailed to [email protected]. Some of the product names and company names used in this book have been used for identification purposes only and may be trademarks or registered trademarks of their respective manufacturers and sellers. Windows® is a registered trademark of Microsoft Corporation. Microsoft.is registered trademark of Microsoft Corporation in the United States and/or other countries. Cengage is an independent entity from Microsoft Corporation and not affiliated with Microsoft in any manner. 88781_fm_hr_i-xxvi.indd 2 8/16/17 7:00 PM Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 Brief Contents INTRODUCTION.............................................................................................xv PART 1 SECURITY AND ITS THREATS ..........................................................................1 CHAPTER 1 Introduction to Security ................................................................................3 CHAPTER 2 Malware and Social Engineering Attacks ................................................. 51 PART 2 CRYPTOGRAPHY .......................................................................................... 97 CHAPTER 3 Basic Cryptography ................................................................................
Answered 5 days AfterMay 03, 2021UNIT 5

Answer To: BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney...

Ali Asgar answered on May 08 2021
142 Votes
Q#1. Man-in-the-middle attack
A Man-in-the-middle Attack or MitM Attack is type of cyber security attack that is used to either monitor a legitimate traffic to steal credentials
or to impersonate someone and make a fraud transaction with another party. In this type of attack, the attacker intercepts the connection between two legitimate users Alice and Bob and communicate with them as if they are communicating with each other.
In this, the attacker may simply eavesdrop the connection and capture login credentials, payment information or similar confidential information that can either be sold or used maliciously at a later stage.
In another form, the attacker impersonates the legitimate users for both ends and the attacker appears to Alice as Bob and to Bob as Alice. Alice thinks he is communicating with Bob, and Bob replies as if he is talking to Alice. The attacker here may modify whole or part of data as per his requirements.
The Image shared shows that
· when Bob asks Alice for her public key, that communication is forwarded to Alice uninterrupted.
· Alice replies to Bob’s request with her public key, which is intercepted by Attacker.
· The attacker stores Alice’s public key with itself, and shares his own public key with Bob.
· Since Bob had requested Alice, he thinks this reply is from Alice and thus stores Attacker’s public key as Alice’s Public Key.
· Now, Bob initiates an encrypted communication with Alice, but uses Attacker’s key for encryption.
· The attacker intercepts this message and reads the message. Here Bob has sent his account number.
· The attacker then sends his own account number to Alice using her public key for encryption.
· Thus, Alice thinks the Attacker’s account number is actually Bob’s account number.
Both Bob and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here