CIS-4017-N System Administration and Security

Module Title:   System Administration and SecurityModule Leader:Chunyan Mu
  Module Code:  CIS-4017-N
Assignment Title:   Cryptography basics, security analysis, design and implementationDeadline Date:11 May, 2022
  Deadline Time:  4:00pm
Submission Method:   Online (Blackboard Ultra)

System Administration and Security CIS4017-N SAS

ICA                 2021-22

Introduction

This assessment includes two parts:

  • Part I involves a set of short questions on the topic of cryptography and will consider the correctness and completeness of the solutions and your understanding of the concepts and will assess learning outcomes PTS1, PKCS3, PKCS4.
  • Part II involves written design exercises and will addess learning outcomes PTS1, PTS2, PKCS3, PKCS4, PKCS5, PKCS6, PKCS7. You are required to analyse three scenarios, select and justify appropriate security techniques as part of solving the problem in the scenarios, deign/implement the solution, and communicate that design as a written report, including rationales, comparisons and alternatives. The use of security related terms and the demonstration of relevant legal, social, ethical and professional issues is included where needed.

You must submit original work written by yourself, you must not share your work with your classmates. If you submit multiple attempts, then I will mark the last submission received before the deadline, or if no submissions are received before the deadline, the submission received first after the deadline will be marked. If you hand in late, I will only mark within 7 days and your work will be capped to a pass.

Part I Cryptography questions (25%)

Basic concept

  1. Explain the difference between symmetric and asymmetric encryption. Describe a method of asymmetric encryption, and discuss the vulnerabilities of it.

Simple encryption and decryption

  • Decrypt OHW PHR XWC CC using the Caesar cipher (shift of 3).

[5 marks]

[5 Marks]

RSA

  • Assume a public key for RSA encryption given by the pair (143,11). Find the private key corresponding to this pair.

[5 marks]

  • Using the pair (143, 11), decode the encrypted message (111 4 88 57 116 67) assuming the letters were represented by ASCII values

(recall that the ASCII values are 65->A, 66->B, … and 97->a, 98->b, …)

[5 marks]

Diffie-Hellman protocol

  • Describe in detail the Diffie-Hellman protocol for three parties Alice, Bob and Carol.

[5 Marks]

Part II Security analysis and design (75%)

Scenario I – Security models                                                                                           [20 Marks]

MGB Ltd. is a company providing security solutions to public services. You are asked to help the MGB Ltd to design a security model for the national defence department – a part of an e-government project on secure information control in managing troops. Assume the armed forces be classified as: {army, navy, air force, marines}, the security levels are typed as: {high, low}.

Your tasks: You should produce a short report (around 500 words) to formalise a Bell Lapadula model to address the confidentiality properties for the specified scenario, and to discuss the strength and weakness of your model.

Hint: You need to describe the model (specify subjects, objects, possible operations – which can be flexible, design your own but need to show your understanding of specifying and applying the BLP model in a real case), the security lattice (a graph can be helpful), the policy and the security properties for the given scenario above.

Scenario II – Security Analysis and Solutions to Conference Management Systems                                                                                         [25 Marks]

A conference manage system is a web-based management system which allows researchers submit research papers, the program committee (PC) members (reviewers) to browse papers and contribute reviews, scores and discussion, and release decisions (such as rejection or accept) via the Web. In one arrangement, the conference chair downloads and hosts the appropriate server software. (A good example is easychair: https://easychair.org/conference)

The system allows users to submit papers, enter reviews & scores and access reviews & scores associated with events (conferences or workshops) regarding to the role of the uses. A user is granted access to the system by providing a role (chair, reviewer, or author) along with a user-id and associated password. Permissible roles for each user are specified at the time a new event is added to the management system. Reviews & scores on papers are initially assigned by chairs (chairs assign papers to reviewers for reviewing, one reviewers can be assigned multiple papers, one paper can be allocated to multiple reviewers). Reviewing are done by reviewers. And a chair can perform any and/or all of these actions, but a chair’s updates can only be changed by the chair. An author, in addition to learning about his or her reviews & grades on individual papers, is entitled to learn the acceptance statistics (but not other papers’ reviews), and the conference program.

Threat model: The adversary is a user who desires to learn the reviews & scores, changes reviews & scores, or prevent others from learning or changing reviews & scores. The adversary has access to the management system and also can read, delete, and/or update network messages in transit. The adversary cannot physically access or run programs on a user’s machine that is running a browser to access the management system. And the adversary can not physically access or run programs on the server hosting the management system.

Your tasks: You are asked to produce a report (1500-2000words) to provide contemplate descriptions of the above Web-based Conference Management System. You should address the following issues:

  1. Demonstrate a broad understanding of the professional, ethical and legal compliance considerations around network security.
    1. Analyse a range of security concepts, security models, principles and practice in an appropriate environment.
  • Evaluate potential secure infrastructures to meet an appropriate system requirement.
    • Select and justify appropriate security techniques to meet an appropriate system requirement.
    • Operate ethically in order to implement and test a secure infrastructure to meet an appropriate business requirement.
    • Communicate effectively and professionally in writing.

Hint: Assuming that the manager is not a technical person, craft your explanation in a way that can be explained to a layman and include figures where necessary. You could think about:

  • Assets and security properties: what objects should be protected, what security properties might we expect the system to enforce? For each such security property, label it with one of: confidentiality, integrity, or availability?
  • Vulnerability: explain the vulnerability in the system and use an attack tree/model to describe how an attack could be mounted. Restrict your consideration to the threat model provided.
  • Protection: what cost-effective protections are available against the threats that you identify. Remember the focus is on software vulnerabilities.

Scenario III- Design and Implementation of a Secure Network

[30 marks]

This task involves designing and implementing an Internet-connected secure network for a medium-sized company requiring 500 machines named Smith Logistics, UK. They want to implement a secure network that uses Class C network address with multiple subnets – They have asked you for a price quote as well. But they want to see a packet tracer implementation and simulation results before they commit to purchasing anything.

You can use Packet tracer/Opnet/Omnet++ for the implementation and security measures. The implementation of the network should consist of core, distribution and access layer.

It should use a minimum of two routers at the distribution and a further 2-4 for the core layer. All router interfaces must be tested for the correct subnet operations.

Your tasks: You should write a report with the appropriate design and implementation solution (2500 words max, but flexible) documenting all that you have done, including how the network is set up. Use the tasks below as a guideline to write.

  1. Using a drawing tool of your choice design the network. Draw a simple network diagram of your network.

Hints: Design the logical diagram. You can ignore the device location in a logical design. Use Visio or any drawing tool for the diagram. Don’t forget to label the diagram core, access and distribution layer.

  • Design and Implement an IPv4 subnetting scheme. You can use any address in class c.
  • Hint: Test a small subsection of the network before implementing the full addressing scheme in packet tracer.
  • The report must describe the design and all of the decisions that you have made in the process of developing the design. This will include a discussion of the design model, Security, WAN protocol, Layer 2, 3 and wireless protocols that you have decided to use. Hint: Restrict your discussion to the main layer 1,2 and 3 protocols
  • Show the detailed cost of implementing your solution in a table format. You can try to show two different costs for the company to choose from.

Hints: Research on the costs of servers (hardware and software), switches, workstations, cables, etc.

  • Show all references used in the report, using appropriate referencing.

Hints: Harvard referencing can be used and make sure the format is fully followed.

Deliverable and deadline

You should submit your report as a PDF document via Blackboard by the deadline of 1600hrs 11 May 2021.

Advice and assistance

Consult the module tutors during a scheduled session or email the module tutors.

Learning outcomes to be assessed (details see assessment criteria)

  1. [PTS1] Communicate complex issues in cybersecurity and system administration to both specialist and non-specialist audiences.
  2. [PTS2] Evaluate, select and use effectively appropriate security and system administration tools.
  3. [PKCS3] Demonstrate a comprehensive and critical understanding of concepts, theories and issues relating to cybersecurity and system administration.
  4. [PKCS4] Research, evaluate and implement modern cybersecurity and cryptography techniques.
  5. [PKCS5] Integrate and synthesise diverse knowledge, evidence, concepts, theory and practice in system administration, including security issues, to solve problems.
  6. [PKCS6] Provide detailed arguments and present conclusions about system administration and security issues, including scenarios with limited or inaccurate information.
  7. [PKCS7] Demonstrate an awareness of ethical conduct in systems administration and cybersecurity scenarios.

Assessment criteria

The criteria below is necessarily incomplete as we cannot anticipate every possible ICA submission.

Q1 (5)Understanding of the concepts
Q2 (5)correctness
    Q3 (5)5 marks for correct solutions of the private key and details provided; if correct p is given: 2 marks; if correct q is given: 2 marks.
    Q4 (5)5 marks for correct decrypt message and details provided; 4 marks if understanding shown but final computation is incorrect, 1 mark for one correct part of the message.
Q5 (5)Correctness and completeness
Grade Part II : scenario I (20) Learning Outcomes to be assessed: PTS1, PTS2, PKCS3, PKCS5, PKCS6
State machine (5)Sound description of the model
Security lattice (5)Correct description on the partial ordering of the security labels
Security properties (5)Reasonability and completeness of the description
Strength and weakness (3)Reasonability and completeness of the description
Writing and reference (2) 
Grade Part II: scenario II (25) Learning Outcomes to be assessed: PTS1, PTS2, PKCS3, PKCS5, PKCS6, PKCS7
      70-100%Excellent   [SYNTHESIS] Demonstrate a broad understanding of the professional, ethical and legal compliance considerations around network security, and an excellent understanding of modern information and network security properties and system threat & vulnerabilities is demonstrated with excellent links to the specified scenario. There is clear evidence of work beyond taught material.   [DESIGN] An excellent analysis of security protection techniques and their application is demonstrated in relation to the specified scenario. There is clear evidence of work beyond taught material.   [WRITE] A very clear and readable report, with excellent structuring, good use of grammar and referencing. Document submitted as PDF.
  60-69%Substantially correct/appropriate (based on taught material & module requirements)   [SYNTHESIS] Demonstrate a good understanding of the professional, ethical and legal compliance considerations around network security, a very good understanding of modern information and network security properties and threats is demonstrated with clear linkage to the specified scenario.   [DESIGN] A very good analysis of security protection techniques and their application is demonstrated in relation to the specified scenario.
   [WRITE] A clear and readable report, with appropriate structuring and referencing. Document submitted as PDF.
                50-59%Minor errors/omissions/issues   [SYNTHESIS] Demonstrate a reasonable understanding of the professional, ethical and legal compliance considerations around network security, and a generally/mostly good understanding of modern information and network security properties and threats is demonstrated with clear linkage to the specified scenario.   [DESIGN] A generally/mostly good analysis of security protection techniques and their application is demonstrated in relation to the specified scenario/task.   [WRITE] A clear and readable report, with minor errors in writing, structure or referencing. Document submitted as PDF.
            40-49%Major errors/omissions/issues   [SYNTHESIS] Demonstrate a limited understanding of the professional, ethical and legal compliance considerations around network security, an a limited understanding of modern information and network security properties and threats is demonstrated and/or limited linkage to the specified scenario.   [DESIGN] A limited analysis of security protection techniques and their application is demonstrated in relation to the specified scenario/task.   [WRITE] A report, with major issues of writing, structure or referencing. Document submitted as PDF.
                  30-39%Unsatisfactory   [SYNTHESIS] Demonstrate a vert limited understanding of the professional, ethical and legal compliance considerations around network security, and a very limited understanding of modern information and network security properties and threats is demonstrated.   [DESIGN] A very limited analysis of security protection techniques and their application is demonstrated.   [WRITE] A report that is difficult to read or comprehend but includes some attempt at structure and referencing OR document is not submitted as a PDF.
0-29%Inadequate   [SYNTHESIS] Demonstrate little understanding of the professional, ethical
 and legal compliance considerations around network security, and little to nothing demonstrated in relation to modern information and network security properties and threats.   [DESIGN] Little to no analysis of security protection techniques and their application.   [DESIGN] A report that is very difficult to read and comprehend, and makes no attempt at referencing.
Grade Part II: scenario III (30)
Learning Outcomes to be assessed: PTS2 , PKCS3 and PKCS5
Task 1 (12)Network Design and Implementation (6 marks); IP and subnetting (6 marks);
  Task 2 (8)Discussion of the relevant protocols and hardware used to design this network and How the protocols meet the requirements.
Task 3 (7)Cost of implementation
Task 4 (3)Professional writing and good use of reference.
Order Now

Get expert help for CIS-4017-N System Administration and Security and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (September 25, 2022) CIS-4017-N System Administration and Security. Retrieved from https://universalassignment.com/cis-4017-n-system-administration-and-security/.
"CIS-4017-N System Administration and Security." Universal Assignment - September 25, 2022, https://universalassignment.com/cis-4017-n-system-administration-and-security/
Universal Assignment August 2, 2022 CIS-4017-N System Administration and Security., viewed September 25, 2022,<https://universalassignment.com/cis-4017-n-system-administration-and-security/>
Universal Assignment - CIS-4017-N System Administration and Security. [Internet]. [Accessed September 25, 2022]. Available from: https://universalassignment.com/cis-4017-n-system-administration-and-security/
"CIS-4017-N System Administration and Security." Universal Assignment - Accessed September 25, 2022. https://universalassignment.com/cis-4017-n-system-administration-and-security/
"CIS-4017-N System Administration and Security." Universal Assignment [Online]. Available: https://universalassignment.com/cis-4017-n-system-administration-and-security/. [Accessed: September 25, 2022]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Get 45%* OFF on Assignment Help

Popular Assignments

Find the Greatest Ancient History Assignment Help Instantly

Ancient History Assignment Help Benefits Student Performance! Ancient History assignment help uplifts student understanding and interest in the area. Ancient history can often become confusing for students because it involves understanding events that are hardly relatable to us in the present generation! Universal Assignment is the perfect platform for the

Read More »

Australia’s Best Aboriginal Studies Assignment Help Online

Upgrade your knowledge with the best Experts:  Quick Aboriginal Studies Assignment Help The world’s most rich research on Aboriginal studies takes place at the top educational institutions in Australia. This field involves rich socio-historical research on the Aboriginal indigenous community of Australia. Aboriginal Studies assignment help online can help students

Read More »

Physical Education Assignment Help: Expert Guidance to Boost your Career

Order Physical Education Assignment Help Instantly! Are you a Physical Education student, struggling to submit assignments on time? Universal Assignment Help Service is the perfect place for all your solutions. With expert guidance available from the best professionals, all your assignments will be top-quality. Physical Education involves a strict and

Read More »

Assignment Help in South Africa

5 Ways to Make Your Assignments Error-Free Assignments are a crucial part of every student’s life as they help them to enhance knowledge about the subjects and also improve academic grades, writing skills, time management skills, research skills, etc. Usually, due to internships, part-time jobs, and other co-curricular activities, students

Read More »

Instant Engineering Assignment Help in Ukraine

Engineering is a vast field of study that consists of several branches. While studying various branches of engineering in the best Ukraine universities, students are required to compose several types of assignments to improve their academic scores. There are many different reasons due to why students seek engineering assignment help

Read More »

[SOLVED] AHS205: The Australian Healthcare System within a Global Context

AHS205: The Australian Healthcare System within a Global Context Part A 1. Healthcare professionals include registered nurses, physicians, dentists, physician assistants, and veterinarians. Registered nurse: The key function which the nurses play in treating the patient with depression include monitoring the clinical progress, improving the compliances of treatment, assessment for

Read More »

[SOLVED] Assignment: Pressure ulcer in ICU in UK

1- Critique different types of evidence ( the area I’ve chosen is pressure ulcer in ICU)2- Analyse what constitutes Best Evidence for practice in the UK3- Critically reflect on the BENEFITS and LIMITATIONS of evidence based practice (EBP) within nursing practice. Using Randomised Controlled Trial (RCT)Student will critique a qualitative

Read More »

[SOLVED] Assignment The lasting negative impact of Colonialism within contemporary Indian Economy and Industry

The lasting negative impact of Colonialism within contemporary Indian Economy and Industry Famine in India and colonialism During the period of colonialism, root causes of famine within India include government policies, population imbalance, crop failure, inflation and war. Increased mortality, epidemic, starvation and regional malnutrition follow and accompany famine within

Read More »

[SOLVED] OSQs: The Psychology of Competition: A Social Comparison Perspective

The Psychology of Competition: A Social Comparison Perspective OSQs Outlines Competitiveness and Social Comparison – The passage is all about reducing differences in the society and developing factors to do social comparison – Situational and individual factors have been highlighted to increase competitiveness The framework highlighting situational and individual factors

Read More »

 [SOLVED] Letter of advice 5126LAW: ASSESSMENT ITEM 3

Law Letter of Advice 25 January 2022 Ms. Amelia Hart 4 Cornet Street, Yeronga Re: Domestic Violence and parenting matter- Hart & Hart Dear Amelia, We do confirm that we have been asked to provide you with advice regarding the parenting and domestic violence matter during the appointment on 24

Read More »

5126LAW: ASSESSMENT ITEM 3  Letter of Advice Problem

5126LAW: ASSESSMENT ITEM 3  Information about this assignment:  This assessment piece requires you to prepare:  1. An initial letter of advice;  2. A draft Application for a Protection Order (Form DV1); and  3. Draft Written Submissions.  Initial letter of advice  Ensure that the initial letter of advice is addressed to

Read More »

HC1021 INTERPERSONAL AND E-COMMUNICATION Assignment T3 [SOLVED]

Student Number: (enter on the line below) Student Name: (enter on the line below) HC1021INTERPERSONAL AND E-COMMUniCATION final assessmeNt Trimester 3, 2021 Assessment Weight: 50 total marks Instructions: All questions must be answered by using the answer boxes provided in this paper. Completed answers must be submitted to Blackboard by

Read More »

COMM1001 Communication in Organisations

Assessment 4 – Written report (1200 Words) 50% Due Week 14 – By 5pm Friday Sept 27th Your full recorded interview from Assessment 3, becomes the basis of your report for Assessment 4 Drawing on the content from your interview and the academic literature related to the three communication topics

Read More »

MBA703 – The Economic Environment – Trimester 2 2022 Assessment Task 2

DUE DATE AND TIME:                        Friday, 23 September 2022, by 8:00pm (AEST) PERCENTAGE OF FINAL GRADE:                                                            40% WORD COUNT:                                   2000 words Description This assignment is based on an article published in the AFR titled “Australia must have a new macroeconomic framework”. Please read the article and answer the following questions (using

Read More »

IT510 Systems Analysis and Design Module Preview

This guide contains a preview of the materials for all module courses in this series: IT510M1: Systems Planning, Analysis, and Logic Processes IT510M2: Data Organization Process IT510M3: System Physical Attributes IT510M4: Written Proposals for System Analysis and Design Be sure to follow the detailed directions found within the actual module

Read More »

BULAW5915 Assignment

Information about the Assignment:   Due date   Sunday, 23:59, 18 September 2022 (Week 9) How to submit   The assignment must be submitted in word format through the submission link on Moodle.   Topics covered by Assignment Topic 4   Maximum word limit   2500 words   Total marks

Read More »

Biomedical Physiology and Engineering assignment

Stent grafts for coronary arteries were first used in the mid 1980’s.  I want you to review the developments in stent graft technology since that time and discuss the natural response of the body to angioplasty and stent placement and how biomedical engineers have responded to the adverse events encountered

Read More »

NRSG374 Assessment Task 1, 2022

ASSESSMENT TASK 1 Professional Development Resource: Narrated PowerPoint Due date: Thursday 15th September 2022 at 4pm Weighting: 50% Length and/or format: Narrated PowerPoint equivalent to 1500 Words +/- 10%8-10 Slides Including Title Page and ReferencesDiagrams and images can be used please include references as per APA7No longer than 8 mins

Read More »

2110AFE – PROBLEM-SOLVING ASSIGNMENT (T 2, 2022)

WEIGHT:          This assessment is worth 30% of the total marks for this course. WORD LIMIT: Your answer to Question 1 (Hypothetical ILAC Question) must be no longer than 1000 words. Your answer to Question 2 & 3 must be no longer than 1000 words. INSTRUCTIONS TO STUDENTS: Students may refer

Read More »

HRM 4801 Managing and Developing People

The following table provides an example of the overview of the assessment requirements. Assessment 1 : Individual reflexive review The following table provides an overview of the assessment requirements. Assignment brief : Individual reflexive review Module code HRM 4801 Module title Managing and Developing People Submission date, time 01.12.2020 :

Read More »

BUS4023 BUSINESS ETHICS

Course/ Module: BUSINESS ETHICS SEGI Course Code: BUS4023 UCLAN Module Code: (if applicable) Lecturer name: William Tan Coursework Submission Date:                         Individual Assessment 1: Week 7 Individual Assessment 2: Week 9 ASSESSMENT METHODS Number of Assessments Form of Assessment     % weighting Size of Assessment/Duration/ Word count Category of

Read More »

Human Subjects Case Studies

Case Study 1 – Research involving adults with terminal illness Dr. Abbott, an oncologist at a major teaching hospital, has been asked to put forward a number of her patients for participation in a clinical trial of a new cancer treatment. Mr. Day is a terminally ill patient with a

Read More »

BA Stage 3 Level 7 Special Education and Differentiation

Assignment Brief and Marking Scheme Programme: Module: Semester: Date of Title Issue: Assignment Deadline: Assignment Submission Details:   Module Credits: Weighting for this Assignment: BA Stage 3 Level 7 Special Education and Differentiation 1 05/10/20 26/11/20 Submit both the essay and the completed IEP in electronic format (PDF) to Moodle.

Read More »

PART II: Media Analysis and Reflection Submission

Students are also required to submit a Media Analysis and Reflection in relation to the media segment (see below) for the Media Discussion Forum. In approximately 350 to 500 words, please expand the synopsis you have provided as a Leader on the Discussion Forum. In this expanded version, you should

Read More »

Philosophy227 Take Home Essay Questions

Philosophy227 Take Home Essay Questions Carel argues that one can be happy – that one’s life can be meaningful – even if one is terminally ill. What is her argument? Do you agree? Is death harmful? Articulate a reason for thinking that death is harmful. Identity an argument against the

Read More »

General Psychology Assignment

Question Mark Travers in his article posted by Psychology Today dated 8th Sept, 2020 posed a question; “Are dating apps a breeding ground for dark personality?” in which new research suggests that the answer is likely yes (Johannes Kepler University). Dark personality triad comprises personality traits of Narcissism, Machiavellianism and

Read More »

Portfolio Planning Tool

Planning for a Target Position: Use this sheet to identify your Key Skill Areas. Add more Key Skill Areas or additional rows if needed.  Within each key skill area, indicate your skills, knowledge, and abilities along with the work samples/evidence you have to prove it, the skill type, source and

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?