Call / WhatsApp+44 7704039352

Find us:Chadderton, Oldham OL9 9PA, United Kingdom

Solutions

3. A diagram (cross sector taxonomy) that shows the shared characteristics between the sectors)


2. An App that will drive SME engagement and incentivise users to maintain profile data, connect with other network users and drive collaboration enabling organisations


1. A digital tool that will enable potential participating businesses to collaborate and share data. The tool should allow for cross-sector Small Medium Enterprise (SMEs) supply-chain collaboration.


You are the project director of a software development company, and your team has won a UK government bid to work with manufacturers in Aerospace, Rail and Automotive to create a software application


You are the Operations Manager of a company in one of the 3 sectors within the case project.


Managing Project Deployment and Delivery 63468


Proposed an exceptional real solution and/or provided novel (new) recommendations to protect a wide part of the network, with detailed investigation of the techniques and/or application, with evidence discussed and referenced.


Strong evidence of cryptographic methods and techniques correctly selected and applied, and explanations that are complete, correct, and communicated clearly.


Question 3: Using an Excel spreadsheet from the tutorial classes, encrypt 16 letters (using ASCII) from your surname and first name (e.g., Alex Corner would be CornerAlexCorne) to produce a ciphertext in hexadecimal


c) Identify the source of the plaintext and explain what the link is between the plaintext and the key.


b) Use the Excel spreadsheet from the tutorial to aid your decryption of the ciphertext. Explain your steps and provide evidence such as suitable Excel screenshots, e.g., of frequency analysis.


a) By completing the Kasiski table below, determine an appropriate key size to use for the decryption. Provide at least one example of how the potential key sizes were found from the interval values.


b) The following ciphertext was encrypted using a substitution cipher. The key phrase to generate the key alphabet is based on a famous cryptographer’s name.


Question 1: In each of the following parts you will be provided with a ciphertext, along with an indication of what type of cipher was used to encrypt it. Use your knowledge of cryptography and cryptanalysis techniques


First<<5678910>>Last