Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Pro Blog
  • Users
  • Groups
  • Unsolved
  • Solved
Collapse
Secnto AI
  1. Secnto AI
  2. Categories
  3. Virtual University
  4. CS204 - Cyber Law
  5. CS204 GDB1 Solution and discussion
CS204 Assignment 2 Solution and Discussion
zaasmiZ
Re: CS204 Assignment 2 Solution and Discussion Assignment No. 02 Semester:Spring 2020 Cyber Law – CS204 Total Marks: 15 Due Date:16/06/2020 Objective: • The objective of this assignment is to enhance the knowledge of the students about cryptography technique for security purposes and cyber security measures. Uploading instructions: • Your assignment must be in .doc or .docx format (Any other formats like scan images, pdf, bmp, etc will not be accepted). • Save your assignment with your ID (e.g. bc020200786.doc). • No assignment will be accepted through email. Rules for Marking: It should be clear that your assignment will not get any credit if: • The assignment is submitted after due date. • The submitted assignment does not open or file is corrupted. • Your assignment is copied from internet, handouts or from any other student • Assignment is covered from lectures 04 to 06. For any query about the assignment, contact at cs204@vu.edu.pk Assignment Questions Questions: Marks 15 Question.1 (10 Marks) Use the caesar cipher method to encrypt the following words with shift key of 3 and show the complete process step by step. • “ASSIGNMENT” • “TOOLS” Question. 2 (5 Marks) Suppose that if you’ve ever tried to login to your online bank account and find that not all of your savings are being accounted for, it could be an indication that you’ve been targeted by cyber criminal. Although there are several ways that cyber criminals could have gotten your account data, there’s a fair chance you’ve accidentally come across a phishing website in the past, misinterpreting the login page of your online bank. Enlist all possible security measures to protect your online banking account from cyber criminals. Best of Luck
CS204 - Cyber Law
CS204 Assignment 1 Solution and Discussion
M
Re: CS204 Assignment 1 Solution and Discussion Assignment No. 01 Semester:Spring 2020 Cyber Law – CS204 Total Marks: 15 Due Date:29/05/2020 OBJECTIVE: The objective of this assignment is to enhance the knowledge of the students about E-commerce business models ,cyber crime, cyber crime catagories and cyber crime security measures. Uploading instructions: • Your assignment must be in .doc or .docx format (Any other formats like scan images, pdf, bmp, etc will not be accepted). • Save your assignment with your ID (e.g. bc020200786.doc). • No assignment will be accepted through email. Rules for Marking: It should be clear that your assignment will not get any credit if: • The assignment is submitted after due date. • The submitted assignment does not open or file is corrupted. • Your assignment is copied from internet, handouts or from any other student • Assignment is covered from lectures 01 to 03. For any query about the assignment, contact at cs204@vu.edu.pk Assignment Questions Questions: Marks 1555 Question. 1 Marks 05 Visit each of the sites below and then place them into one of the four E-commerce business model (s) according to their primary focus: www.newrelic.com www.bulkbookstore.com www.mcdelivery.com.pk www.uber.com www.olx.com.pk Question. 2 Marks 10 Mr. “Omar” is an HR coordinator at XYZ University. He receives an E-mail containing a message that, “Your University’s E-mail account password will be expired within 24 hours” from some fake E-mail account pretending to be the legitimate E-mail from University. Mr. “Omar” is redirected to a fake password renewal page i.e.“xyzcuniversity.edurenewal.com” where both new and existing passwords are requested. The cyber attacker is monitoring the page and hacks the original password to gain access. Keeping in view the above scenario, answer the following questions: Mention the cyber-crime name, which is occurring in the scenario. Mention the category of cyber-crime. Mention all possible prevention measures for such type of cyber-crimes. Best of Luck
CS204 - Cyber Law
CS204 Assignment 3 Solution and Discussion
zareenZ
Assignment No. 03 Semester: Fall 2019 Cyber Law – CS204 Total Marks: 15 Due Date:27/01/2020 Objectives: The objective of this assignment is to enhance the learning capabilities of the student about: • The Intellectual Property Rights • Investigation and Prosecution Agencies. • Power of Officers Instructions: Please read the following instructions carefully before submitting the assignment:  You will submit your assignment before or on due date on VU-LMS.  Assignment sent via Email will not be accepted/graded in any case.  If the submitted assignment does not open or file is corrupt, it will not be graded.  Assignment should be completed by your own efforts it should not be copied from internet, handouts or books.  You will submit solution only in the Microsoft Word File.  Assignment is covered from lectures 09 to 12. For any query about the assignment, contact at cs204@vu.edu.pk Assignment Questions Questions: Marks 15 Question. 1 (05 Marks) E-Series is an online music streaming website which has launched several music albums under its banner name and have all the copyrights reserved for its content. This company has published its music on online streaming website but from there other creators have illegally copied and molded the content of E-series and also uploaded with their own name. E-series took the notice and the case is now sent to National Response Centre For Cyber Crimes for further investigation. After reading the above scenario answer the following Question: Which personnel shall have the authority to obtain and copy the data, use equipment to make copies and obtain an intelligible output from the information system of online streaming website? And Under which Cybercrime Act this authority is delegated to the said personnel. Question. 2 (10 Marks) Identify the most suitable Intellectual Property Right for each of the following case: A cricketer creates his own company to sell his own collection of clothes. What kind of intellectual property can he use to show that his company is making the clothes? Which sort of intellectual property gives you the right to determine who can make and sell copies of your work if you write an original story? If a corporation develops a new idea that boosts its main product, what kind of intellectual property will it use to prohibit others from stealing its invention? Which term describes a logo or sign that identifies a brand? Which intellectual property protection applies for :Getz pharmaceutical Best of Luck
CS204 - Cyber Law
CS204 Assignment 2 Solution and Discussion
zareenZ
Assignment No. 02 Semester: Fall 2019 Cyber Law – CS204 Total Marks: 15 Due Date:02/12/2019 Objective: The objective of this assignment is to understand the concept of cyber security, its need, major security problems and the usage of cryptography technique for security purposes. Instructions: Please read the following instructions carefully before submitting the assignment:  You will submit your assignment before or on due date on VU-LMS.  Assignment sent via Email will not be accepted/graded in any case.  If the submitted assignment does not open or file is corrupt, it will not be graded.  Assignment should be completed by your own efforts it should not be copied from internet, handouts or books.  You will submit solution only in the Microsoft Word File.  Assignment is covered from lectures 04 to 06. For any query about the assignment, contact at cs204@vu.edu.pk Assignment Questions Questions: Marks 15 Question. 1 (05 Marks) Read the following scenario carefully and answer the questions. An employee of XYZ company get subscription to some number of free online IT magazines. During the process of registration for subscription, some information was being asked by the IT magzines in the form of questions, The IT magzines demand for bank details, first magazine asked for his complete date of birth, the second magazine asked for his bank name, and a third asked for his mother’s name.You are required to identify the possible cyber crime going on there also mention at least one prevention measure? Question.2 (10 Marks) Use the caesar cipher method to encrypt the word “ACTIVATION” and show the complete process step by step. Best of Luck
CS204 - Cyber Law
CS204 Assignment 1 Solution and Discussion
zareenZ
Topic thumbnail image
CS204 - Cyber Law
CS204 GDB1 Solution and discussion
zaasmiZ
Graded Discussion Board Semester: Spring 2019 Cyber Law – CS204 Topic: Cryptography Scenario Let us consider that a security company has around 400 employees exchanging valuable sensitive information everyday through internet between offices stationed at Karachi and Islamabad. Mohammad Ali is an IT Manager who oversees the overall IT infrastructure and is responsible for implementing the security measures and policies to guarantee the delivery of the messages safely so that no one can breach the confidential information. To achieve Privacy and high security normally the information is encrypted using symmetric and asymmetric encryptions, however there are some advantages and disadvantages of using both techniques in the above scenario. Point of Discussion: If you are asked to choose the best encryption technique (i.e. Symmetric or asymmetric) in the above scenario then what will be your choice? Support your answer with solid reasons considering the pros and cons of both techniques. Best of Luck !
CS204 - Cyber Law

CS204 GDB1 Solution and discussion

Scheduled Pinned Locked Moved Solved CS204 - Cyber Law
cs204gdb1solutiondiscussionspring 2019
5 Posts 3 Posters 1.9k Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • zaasmiZ Offline
    zaasmiZ Offline
    zaasmi
    Cyberian's Gold
    wrote on last edited by
    #1

    Graded Discussion Board
    Semester: Spring 2019
    Cyber Law – CS204

    Topic: Cryptography
    Scenario

    Let us consider that a security company has around 400 employees exchanging valuable sensitive information everyday through internet between offices stationed at Karachi and Islamabad.

    Mohammad Ali is an IT Manager who oversees the overall IT infrastructure and is responsible for implementing the security measures and policies to guarantee the delivery of the messages safely so that no one can breach the confidential information.

    To achieve Privacy and high security normally the information is encrypted using symmetric and asymmetric encryptions, however there are some advantages and disadvantages of using both techniques in the above scenario.

    Point of Discussion:

    If you are asked to choose the best encryption technique (i.e. Symmetric or asymmetric) in the above scenario then what will be your choice? Support your answer with solid reasons considering the pros and cons of both techniques.

    Best of Luck !

    Discussion is right way to get Solution of the every assignment, Quiz and GDB.
    We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
    Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
    [NOTE: Don't copy or replicating idea solutions.]
    VU Handouts
    Quiz Copy Solution
    Mid and Final Past Papers
    Live Chat

    1 Reply Last reply
    0
    • Khuram ShahzadK Offline
      Khuram ShahzadK Offline
      Khuram Shahzad
      wrote on last edited by
      #2

      File transfer systems normally use hybrid cryptosystems, i.e. a combination of symmetric and asymmetric key encryption, to provide secure file transfers. Symmetric keys facilitate faster file encryptions, while asymmetric keys simplify the key distribution process.

      1 Reply Last reply
      0
      • M Offline
        M Offline
        moaaz
        Cyberian's Gold
        wrote on last edited by
        #3

        Difference Between Symmetric and Asymmetric Encryption

        Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetrical encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.
        Symmetric encryption is an old technique while asymmetric encryption is relatively new.
        Asymmetric encryption was introduced to complement the inherent problem of the need to share the key in symmetrical encryption model, eliminating the need to share the key by using a pair of public-private keys.
        Asymmetric encryption takes relatively more time than the symmetric encryption.

        Discussion is right way to get Solution of the every assignment, Quiz and GDB.
        We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
        Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
        %(red)[NOTE: Don't copy or replicating idea solutions.]

        How to Get Earning from Cyberian

        Quiz Copy Solution
        Mid and Final Past Papers
        Live Chat

        For instructions on how to use this Cyberian discussion board

        1 Reply Last reply
        0
        • zaasmiZ Offline
          zaasmiZ Offline
          zaasmi
          Cyberian's Gold
          wrote on last edited by
          #4

          When it comes to encryption, the latest schemes may necessarily the best fit. You should always use the encryption algorithm that is right for the task at hand. In fact, as cryptography takes a new shift, new algorithms are being developed in a bid to catch up with the eavesdroppers and secure information to enhance confidentiality. Hackers are bound to make it tough for experts in the coming years, thus expect more from the cryptographic community!

          Discussion is right way to get Solution of the every assignment, Quiz and GDB.
          We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
          Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
          [NOTE: Don't copy or replicating idea solutions.]
          VU Handouts
          Quiz Copy Solution
          Mid and Final Past Papers
          Live Chat

          1 Reply Last reply
          0
          • zaasmiZ Offline
            zaasmiZ Offline
            zaasmi
            Cyberian's Gold
            wrote on last edited by
            #5

            Actually, it’s difficult to compare the cryptographic strengths of symmetric and asymmetric key encryptions. Even though asymmetric key lengths are generally much longer (e.g. 1024 and 2048) than symmetric key lengths (e.g. 128 and 256), it doesn’t, for example, necessarily follow that a file encrypted with a 2048-bit RSA key (an asymmetric key) is already tougher to crack than a file encrypted with a 256-bit AES key (a symmetric key).

            Instead, it would be more appropriate to compare asymmetric and symmetric encryptions on the basis of two properties:

            Their computational requirements, and

            Their ease of distribution

            Symmetric key encryption doesn’t require as many CPU cycles as asymmetric key encryption, so you can say it’s generally faster. Thus, when it comes to speed, symmetric trumps asymmetric. However, symmetric keys have a major disadvantage especially if you’re going to use them for securing file transfers.

            Because the same key has to be used for encryption and decryption, you will need to find a way to get the key to your recipient if he doesn’t have it yet. Otherwise, your recipient won’t be able to decrypt the files you send him. However way you do it, it has to be done in a secure manner or else anyone who gets a hold of that key can simply intercept your encrypted file and decrypt it with the key.

            The issue of key distribution becomes even more pronounced in a file transfer environment, which can involve a large number of users and likely distributed over a vast geographical area. Some users, most of whom you may never have met, might even be located halfway around the world. Distributing a symmetric key in a secure manner to each of these users would be nearly impossible.

            Asymmetric key encryption doesn’t have this problem. For as long as you keep your private key secret, no one would be able to decrypt your encrypted file. So you can easily distribute the corresponding public key without worrying about who gets a hold of it (well, actually, there are spoofing attacks on public keys but that’s for another story). Anyone who holds a copy of that public key can encrypt a file prior to uploading to your server. Then once the file gets uploaded, you can decrypt it with your private key.

            Discussion is right way to get Solution of the every assignment, Quiz and GDB.
            We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
            Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
            [NOTE: Don't copy or replicating idea solutions.]
            VU Handouts
            Quiz Copy Solution
            Mid and Final Past Papers
            Live Chat

            1 Reply Last reply
            0

            Reply
            • Reply as topic
            Log in to reply
            • Oldest to Newest
            • Newest to Oldest
            • Most Votes


            How to Build a $1,000/Month PAK VS BAN Live Live Cricket Streaming
            File Sharing
            Earn with File Sharing

            1

            Online

            3.0k

            Users

            2.8k

            Topics

            8.2k

            Posts
            solution
            1235
            discussion
            1195
            fall 2019
            813
            assignment 1
            428
            assignment 2
            294
            spring 2020
            265
            gdb 1
            238
            assignment 3
            79
            • PM. IMRAN KHAN
              undefined
              4
              1
              4.0k

            • Are the vaccines halal or not?
              undefined
              4
              1
              3.8k

            • All Subjects MidTerm and Final Term Solved Paper Links Attached Please check moaaz past papers
              zaasmiZ
              zaasmi
              3
              26
              75.1k

            • CS614 GDB Solution and Discussion
              M
              moaaz
              3
              3
              8.1k

            • How can I receive Reputation earning from Cyberian? 100% Discount on Fee
              Y
              ygytyh
              3
              28
              23.9k
            | |
            Copyright © 2010-26 RUP Technologies LLC. USA | Contributors
            • Login

            • Don't have an account? Register

            • Login or register to search.
            • First post
              Last post
            0
            • Categories
            • Recent
            • Tags
            • Popular
            • Pro Blog
            • Users
            • Groups
            • Unsolved
            • Solved