Q. #5: Go to page 187 of your e-textbook*, complete the task Case Project 4-4: HTTPS and submit your response Case Project 4-4: HTTPS Hypertext Transport Protocol Secure (HTTPS) is becoming...

I have no idea how many pages it is going to take on this assignment and I have uploaded the files below and the text file is for the last questions from the main file.thank you.


Q. #5: Go to page 187 of your e-textbook*, complete the task Case Project 4-4: HTTPS and submit your response Case Project 4-4: HTTPS Hypertext Transport Protocol Secure (HTTPS) is becoming increasingly popular as a security protocol for web traffic. Some sites automatically use HTTPS for all transactions (like Google), while others require that users must configure it in their settings. Some argue that HTTPS should be used on all web traffic. What are the advantages of HTTPS? What are its disadvantages? How is it different from HTTP? How must the server be set up for HTTPS transactions? How would it protect you using a public Wi-Fi connection at a local coffee shop? Should all web traffic be required to use HTTPS? Why or why not? Write a one-page paper of your research. BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Tutorial #2 Total Marks: 30 (6%) Submit your answers to the following questions by Week-5 Friday 5:00PM. Late submissions will incur 5% deduction with each passing day till Week-6 Friday 5:00PM, after which no submissions will be accepted. Warning: Plagiarism is a serious ethical offense with dire consequences. Do not copy and paste from your textbook, online resources, or your friend’s work. Cite and provide reference (Harvard Style) to the original work where applicable. Questions: Q. #1: What is a Hash function? What is its main usage in information security? Perform the following practical task: 1. Go to https://emn178.github.io/online-tools/sha256.html. 2. Enter your full name as input, calculate its SHA256 hash, and share the result. 3. Append a dot (.) to your name, calculate its SHA256 hash, and share your result. 4. Do they match? 5. Remove the dot (.), is the hash value same as before? (5 Marks) Q. #2: What is the difference between symmetric and asymmetric cryptography? Perform the following practical task: 1. Pair up with one of your class-mates for this exercise. (If not feasible, get the help from any other friend). Exchange email addresses with your partners. 2. Go to https://www.devglan.com/online-tools/rsa-encryption-decryption. 3. Each student must generate their RSA public and private key pair by using the above link. Email your public key to your partner. (Attach the screenshot of the email that you sent). 4. Copy and paste your private key here in you answer. (Do not share it with your partner) 5. Use your partner’s public key to encrypt a message that must include your name in it. (Hint: Use the left column of the webpage for encryption, and use public key of your friend). The message must not be inappropriate. Example: “I am David and I love to play squash” 6. Email the encrypted message to your partner. Your partner will do the same and will send you an encrypted message. Share the screenshots. 7. Decrypt the encrypted text sent by your partners using the same link. (Hint: Use the right column of the webpage for decryption, and use your private key). Share the screenshot. 8. Were you able to recover the cyphertext? Email the plaintext (recovered text) to your friend. (5 Marks) Q. #3: Write the process of generating Digital Signatures in your own words? Create a flow chart of the process using pen and paper, take its photo and attach. (5 Marks) https://emn178.github.io/online-tools/sha256.html https://www.devglan.com/online-tools/rsa-encryption-decryption BISY3006/ISY2003/ISY203 Information Security @ Australian Institute of Higher Education, Sydney Q. #4: What are Digital Certificates and what is their usage? What weakness in Digital signatures led towards Digital Certificates? (5 Marks) Q. #5: Go to page 187 of your e-textbook*, complete the task Case Project 4-4: HTTPS and submit your response. (10 Marks) * Ciampa, M. (2018), Security + Guide to network security fundamentals 6th edn. Cengage Learning, United States. Get access to your e-textbook on Moodle by going to Information Security unit > E-text tile.
Apr 15, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here