Order this Assignment Now: £99
Strong evidence of cryptographic methods and techniques correctly selected and applied, and explanations that are complete, correct, and communicated clearly.
2025-04-22T09:44:10+00:00
Kindly share your Latest Assessment to the LIVE EXPERT to get the DISCOUNTED price
55-408808-AF-202425 Introduction to Cyber Security, Maths and Cryptography Coursework 2425
Module Leader:
Level: 4
Module Title: Introduction to Cyber Security, Maths and Cryptography
Module Code: 55-408808-AF-202425
Assessment: 1. 001 Coursework (50%) 2. 002 Written Examination (50%)
001 Coursework
Individual Assessment
Weighting: 50%
Magnitude: Equivalent of 2500 words
Submission Date: Submission Time:
Blackboard Submission: Yes (Both Sections)Turnitin Submission: Yes (Section A)
Format: 2xWord Documents
Feedback Return:
Blackboard Feedback: Yes
In-module retrieval available: No
Learning Outcomes: The following module Learning Outcomes will be assessed through this coursework. Marking criteria to assess these are at the end of each section.
Understanding the key concepts of data confidentiality, integrity and availability and select means by which these properties may be achieved in computer systems.
Select and justify appropriate methods, algorithms and techniques contributing to the security of information systems and networks.
Demonstrate a comprehension of fundamental concepts in cyber security, maths and cryptography.
Coursework: Overview This coursework is comprised of two sections. Section A covers the learning outcomes related to Cyber Security, while Section B addresses learning outcomes related to Mathematics and Cryptography. You are required to complete both sections, which are equally weighted and have separate marking criteria.
Section A: Cyber Security
Section A Introduction The 21st century has seen an unparalleled adoption of technology involving internetworked computers (the Internet). Computers are used in most aspects of our everyday life whether we are students, employees, employers, or private individuals. Security and privacy are very important as we not only have to protect our physical assets but also our data assets.
We are more reliant than ever on technology to control our home environments, music, memories, personal communications, and financial information. Remote working (especially now) is a must, requiring that we have secure communications with our schools, universities, and workplaces. Computer and network security work must address every level of a network or system (including physical, user-based, service-based, host-based, and network-based) to secure data, protect privacy and prevent criminal acts.
No single security component or method by itself can be expected to ensure complete protection for a network - or even an individual host computer. Instead, you need to assemble a group of methods that work in a coordinated fashion to provide protection against a variety of threats.
Section A Assignment Brief You are asked to examine and re-engineer a small business/home office style network (Figure 1) to improve its security, while protecting the key concepts underlying computer and network security: confidentiality, integrity, and availability.
Two desktop PCs (PC1 and PC2), a Laptop, and a Wireless Router: Netgear N300 Wireless DGN2200V4.
PC1 is directly cabled to the Router using a CAT6 ethernet cable, while PC2 and the laptop are connected by wireless to the router.
All the computers contain data (stored on the hard drives) as: lecture notes, lab work, as well as private and personal documents such as family photos etc.
Two mobile phones (a Samsung J3 and an Apple iPhone 7) also connect to the internet using wireless technology
A scanner and a printer are connected to PC1 and are shared by all users on the network.
The premises are kept secure with an IP Camera system, consisting of a GAMUT 4-channel NVR (Network Video Recorder), connected wirelessly to four wireless IP cameras.
Using the network described here (and shown in Figure 1) as a basis, you are asked to:
Identify/enumerate the various threats and risks in the devices and network shown in the diagram. To do this you will consider the security/threat landscape (these are collective terms that refer to the devices and security involved, and the threats that they are commonly subjected to).
Recommend techniques to prevent or mitigate attacks on the network, or on the devices within the network. Identify the technology/configuration you wish to use, the device/s that it is intended to protect, and explain why you feel that this choice of technology/configuration is beneficial to this application. If you choose to replace a device with a different one, explain why, and explain the benefits you expect to see.
Section A Hints
If no explicit information about the security configuration of a device is provided, assume that no security configuration has taken place on that device, and that any security features/settings on the device are not enabled.
Search the internet for missing information, consult existing literature on the various aspects of the problem. You are not being asked to protect against every conceivable attack in the world, only to provide recommendations on how to secure the network to a good standard, using readily-available technologies.
Do not always look for the least expensive way forward, if it will compromise security. While you should not attempt to build an entirely new network from scratch, you are free to replace/upgrade/add devices and/or software if you feel that doing so will improve security. Explain why you have done so, in each case.
Remember to reference your sources using the APA7 standard.
Device Specifications (for reference):
Device
Description/Technical Specs
PC1
Dell Optiplex 755
Intel® Core™2 Duo CPU E8400 @ 3.00GHz 2.99GHz
Operating System: Windows 7 Enterprise, SP1
Malware Protection: Norton 360 Premium
Wireless 802.11 a/b/g PCI Adapter: Cisco Air-PI21AG-E-K9
PC2
Intel(R) Core (TM) Duo CPU, E4500 @ 2.20GHz, 3 GB of RAM
Hard Drive capacity: 250 GB
Operating System: Windows 7- Home Premium, 32-bit
Malware Protection: Norton 360 Premium
Wireless 802.11n/b/g PCI Adapter: TP-Link TL-WN851ND
Laptop
ACER Aspire 5750
Intel(R) CoreTM is-2410, 2.3GHz with turbo boost up to 2.9GHz, 8GB DDR3 Memory
Intel(R) HD Graphics 3000, up to 1760 MB Dynamic Video Memory
Hard drive capacity: 750 GB
ACER NplifyTM 802.1 b/g/n Wireless adapter
Operating System: Windows 10 Professional 64-bit OS, version 1809.
Malware Protection: Norton 360 Premium
Netgear N300 ADSL2 DGN2200V4 Router
IEEE 802.11 b/g/n 2.4GHz
Four (4) 10/100 Fast Ethernet Ports
One (1) ADSL2+ Port
One (1) USB 2.0 Port
Built-in ADSL2+ Modem
IPv6 Support (Internet Protocol Version 6)
Supports the following security features:
Wi-Fi Protected Access® (WPA/WPA2—PSK)
Intrusion detection and prevention (IDS)
Denial-of-service (DoS) attack prevention
…. and many more - see manual for details
Wireless CCTV (Gamut IP Network Video Recorder)
To make additional security recommendations addressing this hardware, you may wish to conduct additional research into common security risks of IP CCTV systems and the means to mitigate these risks.
Phone Handset 1
Samsung Galaxy J3
Phone Handset 2
Apple iPhone 7
Printer
Brother HL-L3240CDW Colour Wired/Wireless LED Printer
Scanner
Brother ADS-4700W Wired/Wireless Scanner
Wireless Access Point
TP-Link AC1350 Wireless Gigabit Access Point
Section B: Cryptography
Section B Introduction Cryptology underpins many protocols in cyber security and, by having an awareness of the fundamental classical and modern techniques in Cryptography and Cryptanalysis, we allow ourselves a broader understanding of how weaknesses can be avoided. The mathematics inherent in these cryptological techniques further enables us to be systematic, clear, and precise about our understanding and presentation of data, numbers, and figures.
Questions:
Question 1: In each of the following parts you will be provided with a ciphertext, along with an indication of what type of cipher was used to encrypt it. Use your knowledge of cryptography and cryptanalysis techniques in order to decrypt the given ciphertext and provide the original plaintext. Provide explanations throughout – see the guidance at the end of this section.
a) The following ciphertext was encrypted using a simple transposition cipher. Decrypt it.
CRUYHTAROPYESCRTMTEAISNCYTGAHBEIAMCDPRY
b) The following ciphertext was encrypted using a substitution cipher. The key phrase to generate the key alphabet is based on a famous cryptographer’s name.
Decrypt the ciphertext below and provide the key alphabet.
Identify the source of the plaintext.
Identify the link between the key alphabet and the source of the plaintext.
FKNSH PNENBRS ZNEURBCYH ZIZBHTZ KRDH AHHU WYVWVZHP BKRB YHSI VUSI VU LVUDHUBNVURS HULYIWBNVU MCULBNVUZ VY VU VUH-FRI MCULBNVUZ UVUH KRZ XCNBH ZCLLHHPHP NU WYVDNPNUE BKH LVUDHUNHULH VM ZIZBHTZ ARZHP VU TVYH LVTWSHG TRBKHTRBNLRS WYVASHTZ ZCLK RZ MRLBVYNUE R ZNEUNMNLRUB YHRZVU MVY NUBHYHZB NU ZIZBHTZ FKVZH ZHLCYNBI NZ ARZHP VUSI VU VUH-FRI MCULBNVUZ NZ BKRB BKH HGNZBHULH VM ZCLK MCULBNVUZ ZHHTZ RZZCYHP FKNSH BKH LVTWSHGNBI VM MRLBVYNUE RUP BKH TVZB HMMNLNHUB MRLBVYNUE RSEVYNBKT RYH ZBNSS VWHU XCHZBNVUZ VM EYHRB NUBHYHZB BKNZ NZ UVB RU NZZCH VM WCYHSI RLRPHTNL NUBHYHZB HZWHLNRSSI NU SNEKB VM BKH SRYEH UCTAHY VM CUAYHRQRASH LYIWBVEYRWKNL ZIZBHTZ BKRB FHYH ZCAZHXCHUBSI AYVQHU
Note: Little credit will be given for a correctly decrypted ciphertext without providing evidence to demonstrate understanding of the cryptanalysis process, e.g., frequency analysis, identifying common letters or words, intermediate steps, etc.
Question 2: The following ciphertext has been obtained using a Vigenère cipher. You are provided with a table of interval values and possible key sizes.a) By completing the Kasiski table below, determine an appropriate key size to use for the decryption. Provide at least one example of how the potential key sizes were found from the interval values.b) Use the Excel spreadsheet from the tutorial to aid your decryption of the ciphertext. Explain your steps and provide evidence such as suitable Excel screenshots, e.g., of frequency analysis.c) Identify the source of the plaintext and explain what the link is between the plaintext and the key.
sequence
interval
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
MIPU
30
QFBE
120
IVTU
220
EXAX
20
XAXW
532
WXKG
330
HVGNKGZMAHRYEGBQSGOUTVJYXAZWJHDEPRPFKBIVTUGHKPK QHONJXKHLMQFBEKSZKYVVMSGFZTUJEQCUGVGMIPUHCFDCWT GBHIUIGVIVHBKKWOAESMIPUJWGTJIVNPOHMLUKLXICUDZHLYS NLCZVSVDWXPTPKTCUVVXMHARWQNDEXAXCTQFBEKFNMRUBKK TEXAXWTSSGEIMOTAEUWYTLTHGYICAPJEMVTROCBSGFXHVMRPS FPLWXMFKMOUTKSHVMTTIVTUEUHSZKVLRYGKRNZCUUPGLBVIKM GWWVCGXCJHCXHVSKTAIWRHCKEEEWICBIXXYKXRNSWUPTGXLQ ICBWGFPFXANOBLHDWMHKGYSWWVMKIPOJOWTUEMTUUFZGGVE WTZRSDUDSPXFQYIQKPJXAXQKOFHPCVXTBEEILIVWXKGUIGDICIT LRUBSUTJITKANSFPPKXUBQNCDKPJGETGSSRWWRXVHLLWUXGRX BHLKFFRGJEKXRNSDUDSEUECIOIVTFJFHPKHVDCEMGXREDSURVR MHDGZZFDDTNMCXGSFJIMMRDGWZXGVWUXAGIGHPMIKTEKQWW XQIGLYXSBRLZRVKCGGWQVCCXGAUIFDVVHMHKGYSXHVSYGCZKC UZVHVHKVIHHGJJHKNXWJDIVXKTLYOQWXFRLMFKBSHSKSFTIKGSF JIMMRKGBOJTRFEXDUFSYTEYGMPGWBHSLWXKQNOGETTSFXAXWHL RRPMAGYWGLCVWVTNGPZBPLWXKGTHSUURGXWCYWUQEISUECSZS JPCVXFCJWSVXEGKXYYSRDJKSFTROCBDCUYLXPZFOLCZRZIPUJWGTF RERJOAWWTUWHESZWCQHZRWBTORIDALWXKQSOMQDKLTOCZVSU TJSNKAKGHRELVLNCGBOWIRGDXPRSUDACCTGBSOMQDKIOXLXSOO XQIMAYZOBDIKEVDRUCYSARGX
Note: Little credit will be given for a correctly decrypted ciphertext without providing evidence to demonstrate understanding of the cryptanalysis process, e.g., example calculations to determine possible key lengths, completed Kasiski table, frequency analysis, etc.
Question 3: Using an Excel spreadsheet from the tutorial classes, encrypt 16 letters (using ASCII) from your surname and first name (e.g., Alex Corner would be CornerAlexCorne) to produce a ciphertext in hexadecimal. Do this by applying the first round of AES (Rijndael) as far as the Shift Row stage. Use the following key:
7F
68
6D
2D
23
6D
1D
98
1D
C5
09
5B
7A
CC
6B
85
Explain all of your steps with supporting evidence (e.g., appropriate Excel screenshots) and provide the encrypted value at the end of each stage. I.e., after Add Key, after Byte Sub, and finally after Shift Row.
Assessment Criteria The following gives an indication of what standard of work would be awarded a grade in each grade boundary. In reality, a piece of work might match some of the description for one grade with elements from other grades, and a grade will be arrived at by considering the balance. For example, a piece of work that mostly matches the description for ‘Upper Second’, with one or two aspects matching those described under ‘First’ might attract a grade high in the 2.1 range.
Category
Mark
Range
%
Identify/select appropriate cryptographic techniques and demonstrate understanding of these in order to solve the given cryptographic problems. (50% of Overall Grade)
Exceptional 1st
93-100
96
Strong evidence of cryptographic methods and techniques correctly selected and applied, and explanations that are complete, correct, and communicated clearly.
High 1st
85-92
89
Mid 1st
78-84
81
Low 1st
70-77
74
High 2.1
67-69
68
Good evidence of understanding of cryptographic methods and techniques taught in the module, and explanations that are mostly complete, correct, and communicated clearly.
Mid 2.1
64-66
65
Low 2.1
60-63
62
High 2.2
57-59
58
A good attempt to apply cryptographic methods and techniques correctly to provide explanations that are often correct, and well-communicated.
Mid 2.2
54-56
55
Low 2.2
50-53
52
High 3rd
47-49
48
Attempts to apply cryptographic methods and techniques to obtain solutions with some success.
Mid 3rd
44-46
45
Low 3rd
40-43
40
Borderline Fail
30-39
35
Work fails to meet most of the requirements for third class. Work that meets some of the description of third class but is still inadequate may attract a grade high in the fail range.
Mid Fail
20-29
25
Low Fail
6-19
10
The quoted price covers up to 3000 words . For custom requirements Live Chat or Whatsapp ← Click Here
Order this Assignment Now: £99
Email: care@academiasupport.co.uk
100% Plagiarism Free & Custom Written, Tailored to your instructions