Assignment Sample on CTEC5801 Foundation of Cyber Security
Task 1
To implement a Vigenère cipher using C program. To encrypts or decrypts a message and prompted to entering the passphrase and for cipher keyword is used. Vigenere cipher is used for encrypting a plain text. By vigenere cipher to get cipher text by modular addition of plaintext and do again keyword (Angelian, 2020).
Program
#include<stdio.h>
#include<conio.h>
main()
{
int choose ;
inti,j;
char paphrase[250];
char kword[33];
int val;
while(1)
{
printf(“n1.Encrypt n”);
printf(“2.Decryptn”);
scanf(“%d”,&choose);
if (choose == 1)
{
printf(“Enter Message to be encrypted /n”);
scanf(“%s”,&paphrase);
printf(“Please Enter keyword /n”);
scanf(“%s”,&kword);
for(i=0,j=0;i
{
if(j>=strlen(kword))
{
j=0;
}
value = (((paphrase[i])-97)+((kword[j])-97));
printf(“%c”, 97+ (value %26));
}
}
else if (select == 2)
{
printf(“ Enter Encrypted Message to be Decryptedn”);
scanf(“%s”,&paphrase);
printf(“Please Enter key /n”);
scanf(“%s”,&kword);
for(i=0,j=0;i
{
if(j>=strlen(keyword))
{
j=0;
}
val= ((paphrase[i])-96)-(kword[j]-96);
if( val< 0)
{
val= val * -1;
}
printf(“%c”,97 + (val % 26));
}
}
else
printf(“Please select a correct option /n”);
}
}
Task 2
Data Recovery Policies for Securing Data
The process of data recovery is recover inaccessible and lost data formatted from the files or secondary storage. When the storage of data in them not able to accessed in a usual way. The recovery of data is usually from the media of storage like hard disk drives which is external and electronic devices. After the duplicate of drive to a drive which is new is suitable for the lost of data recovery effort. If the unsuccessful drive sensibly, there are more reasons for that the data is not simple to read from the devices of media. Depends on the situation ,the offering of solution are repairing of logical file system , updating of firmware or drive recovery techniques ranging from the software recovery of corrupted data. If the drive recovery is vital, the drive has fialed permanently itself and the depends on somewhat on recovery of one time, whatever data recovery read of data. The recovery requirement due to the damage of storage of devices or logical damage of file system which avoids it from the mounted of host operating system. The data recovery scenario involves the operating system failure and malfunction of storage of devices, logical failure of storage devices, accidental data deletion. The harm of data caused when a file is written to the sector has been damaged. The cause of drive failing that needs of data to be reconstructed to become readable. The aim is to copy the important files form the damage of media to another new drive accomplished by using the Live CD by the booting directly from the ROM of the corruption of drive. When the unsuccessful hard drive , the important is reaching the off of data and top priority of drive. The used fault drive longer, the probable further loss of data is to occur. Make drive of image ensure that there is a copy less important data on another device on which it is safe to take testing and actions recovery with no source harm.
Task 3
Email Encryption
With the email protocols original design, the email servers communication was in plain text which cause high security risk. The mechanism proposed for the encryption and email servers communication. The encryption takes place at the level of transport or end to end encryption of transport layer is simple to set up and use. The email sent by clients provides the S/MIME support for secure digital signing of email and message encryption by using the certificates. The encryption other options are PGP encryption and GNU privacy guard. When the message protected by PGP and used hard in the good way. The new version of PGP is simple for decryption of message and most of the user feels difficult with the signing and encryption of message. The decrypted emails for the system user and remain the unreadable form when encrypted to an email service like Gmail is not available the keys decrypted. The email services integrate with the encryption end to end automatically. The vital protocols used for end to end email encryption are pretty Good Privacy, GNU Privacy Guard and Bit message. The Open PGP data encryption standard allows end users for the email content encryption. The client plugins and software of the email which permits the users for the emails content encryption. The email sent by clients provides the S/MIME support for secure digital signing of email and message encryption by using the certificates. The encryption other options are PGP encryption and GNU privacy guard. When the message protected by PGP and used hard in the good way. The new version of PGP is simple for decryption of message and most of the user feels difficult with the signing and encryption of message. The decrypted emails for the system user and remain the unreadable form when encrypted to an email service like Gmail is not available the keys decrypted
Encryption at Transport Level
The extension of email encryption is TLS layer over the communications of plain text. Assume that the servers of email on both the side of sender and receiver support the communication which is encrypted; an eavesdropper snooping on the communication between the servers of mail cannot use a sniffer for contents of email to see the protocol STARTTLS extension exist for the email server and client communication. The revealed of messages encrypted and altered by relays of email. The relays of SMTP individual, encryption takes place not between the sender and receiver. The positive trait of key of the transport layer encryption is that the user needs not to do or anything can be changed. The encryption is difficult for users and government agencies and compliance managers at companies automate the employee process and by using the appliances of encryption and services which automate the encryption. Depending on the voluntary cooperation, automated encryption based on the policies defined and takes the decision and process out of the hands of user. The emails are routed through a appliance of gateway configured for make sure of compliance with the policies of security. The encryption occurs automatically when send the email. As organization receiving can run the scanners of virus and filters spam before email delivering to the receiver. But, it means that the organization receiving and anyone can read or change the email. If the organization receiving is considered a threat, then end to end encryption is essential. The foundation of electronic frontier encourages the STARTTLS use and makes it easy and simple for all to help to make sure their communications in email aren’t vulnerable to mass surveillance support for STARTLS has common; The verification of mandatory certificate is not viable historically for delivery of internet mail with no extra information since more certificates are not verifiable and delivery of few want email to fail. As a result, email is delivered over TLS uses encryption opportunistic. Mandatory certificate verification is historically not viable for Internet mail delivery without additional information, because many certificates are not verifiable and few want email delivery to fail.
End to End encryption
The data encryption and decryption takes place at the point at end. An email sending with encrypted at the source and the service provider transit unreadable in Gmail and at the end point decrypted. The decrypted emails for the system user and remain the unreadable form when encrypted to an email service like Gmail is not available the keys decrypted. The email services integrate with the encryption end to end automatically. A certificate valid is obtained and enabled the STARTTLS on the server of email by organizations receiving. For attack prevent of downgrade, the business send the list of policy for STARTTLS. The email sent by clients provides the S/MIME support for secure digital signing of email and message encryption by using the certificates. The encryption other options are PGP encryption and GNU privacy guard. When the message protected by PGP and used hard in the good way. The new version of PGP is simple for decryption of message and most of the user feels difficult with the signing and encryption of message. The decrypted emails for the system user and remain the unreadable form when encrypted to an email service like Gmail is not available the keys decrypted. The vital protocols used for end to end email encryption are pretty Good Privacy, GNU Privacy Guard and Bit message. The Open PGP data encryption standard allows end users for the email content encryption. The client plugins and software of the email which permits the users for the emails content encryption.
Email encryption setup and use
The transport layer encryption by using the set up of starts TLS by the receiving of organization. A certificate valid is obtained and enabled the STARTTLS on the server of email by organizations receiving. For attack prevent of downgrade, the business send the list of policy for STARTTLS. The email sent by clients provides the S/MIME support for secure digital signing of email and message encryption by using the certificates. The encryption other options are PGP encryption and GNU privacy guard. When the message protected by PGP and used hard in the good way. The new version of PGP is simple for decryption of message and most of the user feels difficult with the signing and encryption of message. The decrypted emails for the system user and remain the unreadable form when encrypted to an email service like Gmail is not available the keys decrypted. The email services integrate with the encryption end to end automatically. The vital protocols used for end to end email encryption are pretty Good Privacy, GNU Privacy Guard and Bit message. The Open PGP data encryption standard allows end users for the email content encryption. The client plugins and software of the email which permits the users for the emails content encryption.
The encryption of public key of another peoples verifying and finding and the sharing of key own. The user feels difficult for encryption and agencies of government and managers of compliance at companies have encryption automation.Depending on the cooperation of voluntary, the encryption automation based on the defined policies and decision taken and process the user out of hands. The routed emails through a gateway appliance configured for ensure compliance with security policies. The emails need are automatically encrypted and sent. If the working of receiver at an organization and that uses the same gateway of encryption and decryption of emails automatically and making the process transparent an extra step either public key procuring or online portal message retrieval logging.
Task 4 : Network Analysis
Host initiating the connection MAC address:
Destination: 02:60:ac:9a:bc:04 (02:60:ac:9a:bc:04)
Address: 02:60:ac:9a:bc:04 (02:60:ac:9a:bc:04)
Destination host IP address – 192.168.97.102
Initializing host port – 67
Destination host port -68
Start Frame
MAC Address
PORT NUMBER
Reference
- Angelian, 2020. The Vigenère Cipher Encryption and Decryption. Journal of Information Security.
- Babrahem’s, A. S., 2020. Study of the Security Enhancements in Various E-Mail Systems. Journal of Information Security.
- Banerjee, U., 2020. Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection. International Journal of information security.
- fernetta, 2020. Maintaining a secure environement OS. International Journal of Computer Science, 234-239.
Assignment Services Unique Submission Offers: