Skip to content
  • 0 Votes
    29 Posts
    17k Views
    zaasmiZ
    The verizon and symantec reports show that_______________. Web is the most vulnerable vector Email is the most attacked vector IOT is more secure than other technologies Malicious internal users or disgruntled employees cause most damage [image: YdrJ2Mo.png]
  • 0 Votes
    5 Posts
    2k Views
    cyberianC
    @Saif-Ali-Qureshi said in CS205 Assignment 2 Solution and Discussion: please share assignment file. CS205 today is last due date. Plz follow the steps and get results on your pc.
  • 0 Votes
    3 Posts
    1k Views
    zaasmiZ
    @moaaz said in CS205 Assignment 1 Solution and Discussion: Question No-2: Consider an online performance evaluation system of a company where its employees enter the daily status of the tasks assigned to them in online sheets available in the system. The sheets are analyzed by the competent authorities of the company on daily basis to evaluate the performance of the employees. You are required to briefly explain the confidentiality, integrity and availability with the help of example associated with this system. In your point of view which component of C.I.A. Triangle model will get the highest importance and which component will get the least importance according to above mentioned scenario? Solution: Integrity: An employee always relies on the accuracy of entered data /information. Therefore, use of advanced, efficient technology and proper optimization is necessary to ensure that integrity is maintained and employee’s information is secure. Whenever any employee enters his work progress then that information must remain in its original form otherwise any wrong change in report can create a lot of problems for employees. So, the integrity of data should be safe. Confidentiality: The employee must expect the privacy. Confidentiality with the use of evaluation system should be high and there should be surety of maintaining privacy between higher management and employee. To access the performance evaluation system, an employee must enter a security password which is available only to authorized employee of the company. Company also needs to ensure privacy of any employee’s performance report. Proper encryption of data ensures that high level of confidentiality is maintained whereas lack of attention towards the same could lead to breach of data/ information. Moreover, the policy related to changing password after regular intervals will help to keep data and information secure. Availability: All employees use evaluation system at the end of day to enter their progress status of the tasks/work, assigned to them. So, if the related interface is not available at the time of entering data, then employees would not be able to enter the information in the system. Consequently, the higher management may perceive that the employee(s) has /have intentionally not entered the required information and may take action in this regard. Furthermore, if the system will not be available specially at the time when most of the employees will be updating their status, then it will make the employees frustrated just because no one want to spend extra hours after the working hours. So the availability of the system is also important. Part-2: Integrity and Confidentiality holds the highest importance in this scenario. The availability of system has less importance from information security point of view.
  • 0 Votes
    3 Posts
    1k Views
    zaasmiZ
    @aleem1990 said in CS205 Assignment 3 Solution and Discussion: Assignment No. 03 Semester: Fall 2019 CS205: Information Security Total Marks: 25 Due Date: 22/01/2020 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx)  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc) Objectives: To enhance the learning capabilities of the students about cryptography and crypto algorithms. Assignment Question 1: You are required to encrypt the string “Security Professional” and decrypt the string “MdgfjVhjfbteut” using following tables with “Substitution Cipher Method”. [image: 2jpMsDs.png] Question 2: You are required to encrypt the plain text “ACCOUNTABILITY” using Vigenere Square Cipher method? Suppose that keyword is “SILENT”. Question 3: You are required to encrypt the plain text “wearesecurityprofessionalsinuk” into cipher text using columnar transposition method with a Key: “231645”. Best of luck Any Frnd have CS205 Solved 3rd Assignment. Kindly Share it urgent Here are the step-by-step solutions for your cryptography questions. Question 1: Substitution Cipher To solve this, we map each letter of the plaintext to its corresponding character in the provided substitution table. (Note: Since you didn’t provide the specific mapping tables, I have demonstrated the method using a standard Caesar-style shift or a placeholder logic. Please apply your specific table values to this process). Encryption (“Security Professional”): Take each letter (S-e-c-u-r-i-t-y…). Look up ‘S’ in the “Plaintext” row of your table. Write down the character directly below it in the “Cipher” row. Decryption (“MdgfjVhjfbteut”): Look up ‘M’ in the “Cipher” row. Write down the character directly above it in the “Plaintext” row. Question 2: Vigenere Square Cipher Plaintext: ACCOUNTABILITY Keyword: SILENT Step 1: Align the Key Repeat the keyword until it matches the length of the plaintext: Plaintext: A C C O U N T A B I L I T Y Keyword: S I L E N T S I L E N T S I Step 2: Intersection Logic Using a Vigenere Tableau, find the intersection of the Plaintext letter (column) and Keyword letter (row). Plain (P) Key (K) Calculation Ciphertext A (0) S (18) S C (2) I (8) K C (2) L (11) N O (14) E (4) S U (20) N (13) H N (13) T (19) G T (19) S (18) L A (0) I (8) I B (1) L (11) M I (8) E (4) M L (11) N (13) Y I (8) T (19) B T (19) S (18) L Y (24) I (8) G Final Ciphertext: SKNSHGLIMMYBLG Question 3: Columnar Transposition Plaintext: wearesecurityprofessionalsinuk Key: 231645 Step 1: Arrange into Grid The key has 6 digits, so we arrange the text in rows of 6. 2 3 1 6 4 5 w e a r e s e c u r i t y p r o f e s s i o n a l s i n u k Step 2: Read Columns by Key Order Read the columns based on the numerical order of the key (1, 2, 3, 4, 5, 6). Column 1 (Key 1): AURII Column 2 (Key 2): WEYSL Column 3 (Key 3): ECPSS Column 4 (Key 4): EIFNU Column 5 (Key 5): STEAK Column 6 (Key 6): RROON Final Ciphertext: AURIW EY SLE CPSS EIFN UST EAK RROON (Spaces added for readability)
  • 0 Votes
    5 Posts
    2k Views
    zareenZ
    @zareen said in CS205 Assignment 2 Solution and Discussion: A user noticed that someone is using his Facebook account after stealing his credentials. After investigation, he observed that it happened after installing a software downloaded from an un-authentic website. Aug 25, 2019 - Hacked Facebook accounts are being sold on the dark web, showing the … Problem is that since so many web sites make you use your email for log in name, I’m not … 90 EACH days after the ‘worst ever’ hack of 50 million users (and here’s … a hacker has claimed he sold the plaintext passwords and email … link text
  • 1 Votes
    4 Posts
    2k Views
    Muhammad Habib Ur RehmanM
    • CIA triad Question No. 1 [Marks: 10] Suppose you are attempting the exam for the post of Information Security Engineer in the ABC organization. During the exam, you are given the following real life scenarios associated with the three main pillars of informing security (C.I.A) : Suppose fifty cancer patient’s treatment is being carried out by Dr. Ali in the well-reputed cancer hospital in Lahore. All the medical information of those patients is stored in the table of the hospital’s database system. Dr. Ali suggests medicine to the patients on the basis of patient’s relevant information stored in the database. If another doctor who has also legal rights to access this table of the database, unintentionally changes the information that can mislead the patient treatment. CSS Exam’s applicants are checking their results online through the FPSC website but the FPSC website takes too much time to load. The AZB limited Bank makes a plan for launching a new offer for capturing customers in a market but this plan leaked to its competitors. A bank’s ATM is not responding due to general backend server error. If a renowned shoe brand’s prices and specifications available on online shopping stores are changed by an unauthorized person. If you are replying to the messages of your friend, then it should be received in the original form as it is sent by you. Upon the last date of applying for the online job application, the related website is not responding due to some technical problems which makes the candidates unable to submit their job application on time. Student’s board results information (Marks, CGPA) is considered very important and it should be available only for that specific student and their parents rather than other class students. A developer’s salary slip in the software house should not be visible to any other developer. Student’s semester grades are posted on the class Facebook group by some unauthorized student. After carefully reading and analyzing the above-mentioned scenarios and fill the following table: Scenario. No Associated C.I.A security component 1 2 3 4 5 6 7 8 9 10 kindly i want solution of this question plzzz
Reputation Earning
How to Build a $1,000/Month World CUP LIVE Matches Live Cricket Streaming
Ads
File Sharing
Stats

1

Online

3.0k

Users

2.8k

Topics

8.5k

Posts
Popular Tags
Online User
| |