Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Java Expert


Home >> Java

Task 1.Online Discussions

Below are listed a set of topics. You are required to conduct research and participate in online/forum discussions on a topic from the set (total of seven topics). In your discussion postings, you should try and address the following points:

  • Provide information about the topic (discuss the topic, describe the relevant technologies, applications of the technologies, clarify vague areas of other students postings, etc.)
  • Raise questions about the information provided by other students (this must be done in an adequately professional manner)
  • Respond to questions raised about your own information and other student's
  • Contribute to discussions in general

Note that the aim of this task is:

  • To build an understanding and perspective of current hot topics in Network Security; and
  • To build generic skills including, but not limited to
    • A capacity for teamwork and collaboration
    • An ability for critical thinking, analysis and problem solving
    • Gaining or improvinginformation technological literacy
    • A capacity for lifelong learning and an appreciation of its necessity

As such, the more you contribute the development of these topics and related discussion the more likely you will score well in this task.

Topic Set 

1.      The security advantages of using two-factor authentication, such as the integrated fingerprint reader in the more recent iPhone models, particularly to support internet services (such as online banking)

2.      The future of internet anonymity services, such as Tor, given the recent revelations of NSA hacking on a global scale

3.      Encrypting more and more internet services with SSL (HTTPS) by default

4.      The security risks around BYOD (Bring Your Own Device) in the workplace

5.      The security risks around using Cloud Computing

6.      The security risks to critical infrastructure (such as power, communication, water) from malicious cyber attacks

7.      Offering financial rewards for finding security vulnerabilities in software

Your submission

You are required to prepare and submit a report on your topic to address the following questions:

1.      Summarize the topic and the issues discussed. Discuss how your own posts contributed to this knowledge.

2.      Based on your own research, discuss whether or not the summary presented in (1) is accurate.

3.      Identify any important issue/s that you believe were not addressed, or not addressed adequately in the discussions. Explain why you view this issue/these issues as important.

4.      Discuss what you believe to be the most important lesson you have learnt as a result of these discussions. Explain the impact of this and its application/impact in real life.

Task 2: Security Infrastructure and Protocols

a)      PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust. 

b)      The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust modelassumed in SSL, and compare it with the trust model used in Kerberos. Kerberos is designed to operate is a relatively small domain, such as a single company. Discuss the practical issues around extending the Kerberos trust model to a global scale, say to provide secure services between Amazon and its customer base .

Task 3: Security Primitives

a)      Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

b)      What is the relationship between hashing and digital signatures? Which fields of an X.509 certificate are related to hashing and/or digital signatures?

c)      Explain how hashing, MACs and digital signatures are used in SSL. Explain how the cipher_suites parameters are used to specify or change a given collection of algorithms for hashing, MACs and digital signatures.


Attachment:- Assignment.docx

Java, Programming

  • Category:- Java
  • Reference No.:- M9895439
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Java

Assessment database and multithread programmingtasktask 1

Assessment: Database and Multithread Programming Task Task 1: Grade Processing University grading system maintains a database called "GradeProcessing" that contains number of tables to store, retrieve and manipulate stud ...

Can someone help me please with those question1what is the

Can someone help me please with those question 1:what is the best data type for student id datatime,currency,number,decimal 2:which relationshipis preferable? one to one,one to many,many to many 3:if you add table A's pr ...

Assignment - method in our madnessthe emphasis for this

Assignment - "Method in our Madness" The emphasis for this assignment is methods with parameters. In preparation for this assignment, create a folder called Assign_3 for the DrJava projects for the assignment. A Cityscap ...

Object-oriented software development1 introduction 11

OBJECT-ORIENTED SOFTWARE DEVELOPMENT 1. Introduction 1.1 Assignment Requirement 1.2 Deliverables and Structure (what to submit) 1.3 Software Restrictions 1.4 How to score high... 1.5 Assumptions 2. System Requirements 2. ...

Overviewyou are required to use java se 80 and javafx to

Overview You are required to use Java SE 8.0 and JavaFX to develop a Graphical User Interface (GUI) for the FlexiRent rental property management program created in Assignment 1. This assignment is designed to help you: 1 ...

Question slideshows or carousels are very popular in

Question : Slideshows (or carousels) are very popular in websites. They allow web developers to display news or images on the website in limited space. In this code challenge, you are required to complete the JavaScript ...

Can someone kindly help me to consider whether java

Can someone kindly help me to consider whether Java provides the facility of operator overloading? If it does, may you kindly describe how overloading operators can be accomplished? If not, may you kindly describe why yo ...

Part a specification - robot simulationpart a

PART A Specification - Robot Simulation PART A Requirements To complete this assignment you will use the supplied eclipse project Robot P1/. It is already set up to execute a simple arm movement loop which you will build ...

Assessment -java program using array of Assessment -JAVA Program using array of objects

Assessment -JAVA Program using array of objects Objectives This assessment item relates to the course learning outcomes as stated in the Unit Profile. Details For this assignment, you are required to develop a Windowed G ...

Applied software engineering assignment 1 -learning

Applied Software Engineering Assignment 1 - Learning outcomes - 1. Understand the notion of software engineering and why it is important. 2. Analyse the risk factors associated with phases of the software development lif ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As