TaskWrite around 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty guidelines....

1 answer below »
TaskWrite around 600 to 800 words for each of the short-essay questions. All questions are of equal value. You should provide credible references for each question according to the Faculty guidelines.

Topic 1- Introduction to Information Security

Question 1Research the issue of
social engineering
in the context of cyber security and report your findings, including what the problem is, types of social engineering techniques, existing and potential protection mechanism and future trends.

Topic 2 - Cryptography



Question 2
Research the two generalized cryptographic schemes: symmetric and asymmetric encryption. Write a report comparing the two schemes. Your research should include the latest developments in this field along with classical concepts.

Topic 3, 4 & 5 - Network Security fundamentals and Firewalls

Question 3

Intrusion detection systems (IDS)
are used to monitor a network or systems for malicious activity or policy violations. Research the issue of current trends in Network Intrusion Detection Systems and report your findings.


Referencing

All sources of information must be appropriately referenced using the APA style ( http://student.csu.edu.au/library/integrity/referencing-at-csu )

Rationale

This assessment aims at partially achieving the following subject objectives:


- be able to explain basic information security concepts;
- be able to discuss and debate some of the security implications of computer networks;
- be able to compare and contrast firewall technologies.



Answered Same DayDec 26, 2021

Answer To: TaskWrite around 600 to 800 words for each of the short-essay questions. All questions are of equal...

Robert answered on Dec 26 2021
110 Votes
Introduction
Today society is more dependent on digital devices so social engineering is greatest threat to
all type of security system. Social
engineering is the way of handling people in skilful manner
so they give up secret data. The different kinds of data these hackers are seeking can depend.
Social engineering depends on user interaction and they often involve clever people into
breaking normal security rules. In this document, we focus on the issue of social
engineering in the context of cyber security and how does these issues get solved. Cyber
security is the technique used to protect the computers, networks from attacks and
unauthorized access.
Problem: Social engineering is used to gain cyber information
Now days cyber criminals use social engineering to collect personal data such as passwords,
firewall data, network information etc. The method of doing social engineering attacks are
via email, phone call or through use of internet. This methodology takes more time as it
depends upon on the security rules of the firm and the sensitivity of data.
The various loss to organization due to social engineering attacks as follows
1. Personal data is shared with unknown user across the internet or via email due to
social engineering.
2. The loss of data from sever is very high so companies always at risk of important
data.
3. Unknown mails being initiated from user system, which will be send across the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here