
-
Re: CS315 Assignment 1 Solution and Discussion
Assignment No. 01
Semester: Spring 2020
Network Security-CS315 Total Marks: 20Due Date: 29-May, 2020
Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx).
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc).Objectives:
To enhance the learning capabilities of students about Network Security Requirements and Algorithms.
Assignment
Question 1: Marks 14
Carefully analyze the scenarios/problems mentioned below and suggest the most suitable security requirements that should be fulfilled by the organizations to overcome their respective problem(s).
ABC Bank is providing credit card services to its clients. One of its clients Mr. Amir lost his credit card and he received an email of credit card transaction from the bank.
XYZ Soft wants to check that which employee has accessed their system after office working hours but it is unable to trace the employee because organization don’t keep any system logs.
ITC University is providing access to its students of their results through online portal but one of its students is executing scripts to access the server again and again that causes the server to get down.
A student takes admission in the university. After a year, university found that student’s actual information is not matching with the information entered in the university’s database.
A doctor in a hospital detected that one of its patient’s information has been altered by one of the medical staff who was not authorized to access that information.
Glass Soft is providing online gaming facility to end users but one of its employees leaked the information and now users getting spam messages.
Chatbot organization is providing online chatting services to its users. It’s two users A and B are chatting with each other while some user C is sending message to A while pretending that it’s B.
Question 2: Marks 06
Given tables contain the combinations of Plain text, Cipher text and Key Stream. You are required to discover Cipher text and Key stream in binary form while Plain text in decimal form with the help of stream cipher algorithm using following data:
a) Given plain text and key stream. Discover Cipher Text (binary).
Plain Text Key Stream Cipher Text 01010111 11011101 ?b) Given cipher text and key stream. Discover Plain Text (decimal).
Cipher Text Key Stream Plain Text 011011101 101110110 ?c) Given plain text and cipher text. Discover Key Stream(binary).
Plain Text Cipher Text Key Stream 101110110 011010101 ? -
Assignment No. 03
Semester: Fall 2019
Network Security-CS315 Total Marks: 20Due Date: 23-Jan-2020
Instructions:
Please read the following instructions carefully before submitting assignment:You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx).
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc.).
Assignment solution submitted in image format or image(s) pasted in the solution file.Objective:
To enhance the knowledge about Cloud Security and Virus Attacks involved in Network Security.
Assignment
Question No.1: 10 Marks
Different organizations are providing cloud services to their clients/users/customers and suffering from the various issues. Which countermeasures these organizations can use to avoid following issues:
ABC Organization is providing free email services to end users but some unknown person is using it for spamming. An organization requires Signup access to its free cloud storage services. The administrators of the organization can view and manage user data. After some days, one of the administrators leaked users’ data. Now users are receiving spam emails and SMS. A Bank is providing credit card services to its customers. A person lost his credit card and he received an Email/SMS of credit card transaction from bank. A Multinational organization is providing credentials to their employees to access their online portal and manage their services. One of the employees stuck in some problem and provide credentials to third person outside the organization for help. After somedays organization detected that their critical services are controlled and manipulated by some anonymous person. XYZ University is providing access to its students to their result and other online portals but one of its students is executing scripts to access the server again and again until the server gets down.Question No.2: 10 Marks
Suppose a system is infected with a virus and functioning abnormally. Before virus is diagnosed, some malicious activates are being faced by the user. Now during the virus lifetime in the system, it will go through different phases. You need to identify its phases for the following mentioned scenarios:
Scenario Phase User run IDM (Internet Download Manager) application in the system then instead of execution, it creates multiple files in different portions of hard disk. User tries to open any file but system shutdown immediately and damage operating system files. User opened a file but instead of executing that file it executed another file in infinite loop. User open PDF reader application and virus got activated. On opening an excel file, a virus just created two different copies of it.Best of Luck!
-
Assignment No. 02
Semester: Fall 2019
Network Security-CS315 Total Marks: 20Due Date: 28/11/2019
Instructions:
Please read the following instructions carefully before submitting assignment:You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx).
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc.).Objective:
To enhance the knowledge about Cryptographic techniques involving symmetric and asymmetric algorithms.
Assignment
Question No.1: 10 Marks
Message authentication in “One-way Hash” function can be implemented with and without encryption. Considering the scenario where a message is authenticated without encryption between two stations, you are required to answer the following questions:
a) What will be component of the message sent from station A and received at station B?
b) What component of the message will ensure at receiving station that message is not corrupted?Question No.2: 10 Marks
Cryptography is usually done by using Symmetric and Asymmetric encryption algorithms like Public-key encryption algorithms and Hash functions respectively. How would you differentiate Public-key encryption algorithms and Hash functions on the basis of following?
a) Mechanism of mathematical operations.
b) Number of keys being used for cryptography.Best of Luck!
-
Assignment No. 01
Semester: Fall 2019
Network Security-CS315 Total Marks: 20Due Date: 15/11/2019
Instructions:
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx)
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc)Objective:
To learn about Network Security Requirements and administrative tasks.
Assignment
Question 1: Marks 10
Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.
1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.
2- ATM service is down since morning.
3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.
4- A student has got his university card, but with a picture of some other student on it.
5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.
Question # 2 on next page.Question 2: Marks 10
Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.
Best of Luck!
CS315 Assignment 3 Solution and Discussion
-
Assignment No. 03
Semester: Fall 2019
Network Security-CS315 Total Marks: 20Due Date: 23-Jan-2020
Instructions:
Please read the following instructions carefully before submitting assignment:You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if: The assignment is submitted after due date.
The assignment is not in the required format (doc or docx).
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc.).
Assignment solution submitted in image format or image(s) pasted in the solution file.Objective:
To enhance the knowledge about Cloud Security and Virus Attacks involved in Network Security.
Assignment
Question No.1: 10 Marks
Different organizations are providing cloud services to their clients/users/customers and suffering from the various issues. Which countermeasures these organizations can use to avoid following issues:
- ABC Organization is providing free email services to end users but some unknown person is using it for spamming.
- An organization requires Signup access to its free cloud storage services. The administrators of the organization can view and manage user data. After some days, one of the administrators leaked users’ data. Now users are receiving spam emails and SMS.
- A Bank is providing credit card services to its customers. A person lost his credit card and he received an Email/SMS of credit card transaction from bank.
- A Multinational organization is providing credentials to their employees to access their online portal and manage their services. One of the employees stuck in some problem and provide credentials to third person outside the organization for help. After somedays organization detected that their critical services are controlled and manipulated by some anonymous person.
- XYZ University is providing access to its students to their result and other online portals but one of its students is executing scripts to access the server again and again until the server gets down.
Question No.2: 10 Marks
Suppose a system is infected with a virus and functioning abnormally. Before virus is diagnosed, some malicious activates are being faced by the user. Now during the virus lifetime in the system, it will go through different phases. You need to identify its phases for the following mentioned scenarios:
Scenario Phase User run IDM (Internet Download Manager) application in the system then instead of execution, it creates multiple files in different portions of hard disk. User tries to open any file but system shutdown immediately and damage operating system files. User opened a file but instead of executing that file it executed another file in infinite loop. User open PDF reader application and virus got activated. On opening an excel file, a virus just created two different copies of it. Best of Luck!
-
@zareen said in CS315 Assignment 3 Solution and Discussion:
User run IDM (Internet Download Manager) application in the system then instead of execution, it creates multiple files in different portions of hard disk.
Unlike the biological viruses that cause the common cold, people create … Despite the many variations of viruses, most have two phases to their execution: infection and delivery. … the Calculator, Notepad, Help, and other programs on the hard disk. The virus then scans the computer to locate .exe files on other drives and …
Reff -
@zareen ans 5th point of first question please as soon as posible
-
@zareen said in CS315 Assignment 3 Solution and Discussion:
A Bank is providing credit card services to its customers. A person lost his credit card and he received an Email/SMS of credit card transaction from bank.
In case of card identity theft/loss or a fraudulent offline or online transaction, report the loss immediately to the bank or card provider and have the card blocked. For this, make sure that you have the customer care number of your bank handy. Follow it up with a letter or e-mail. It is also advisable to lodge an FIR at the earliest.
If the bank does not respond within a week, approach the nodal officer. If there is no response from the bank within 30 days, contact the banking ombudsman appointed by the SBP. If this measure too fails, approach the court of law for redressal.
Q.2
Scenario Phase User run IDM (Internet Download Manager) application in the system then instead of execution, it creates multiple files in different portions of hard disk. infection User tries to open any file but system shutdown immediately and damage operating system files. infection User opened a file but instead of executing that file it executed another file in infinite loop. User open PDF reader application and virus got activated. On opening an excel file, a virus just created two different copies of it. -
@zareen said in CS315 Assignment 3 Solution and Discussion:
ABC Organization is providing free email services to end users but some unknown person is using it for spamming.
-
Train your spam filter
When you get a spam email from an unknown sender, don’t just delete it. Select it, and mark it as a spam message. Sometimes, your email client may mark an important email from a known sender as spam. In such scenarios, you need to mark that email as safe to train the email client about your false positives. -
Never respond to spam
In case you received a spam email and recognized it before you open it, don’t open it. If you realize an email as spam only after opening it, mark it as spam and close it. Do not click the links or buttons, or download files from the spam messages. -
Use alternative email addresses
A lot of unwanted emails can make their way into your inbox if you order a product or subscribe to a mailing list. By ordering a product or subscribing to a mailing list of a company, you are automatically signed up to receive unwanted marketing updates from that company, or it may share your contact information with a third-party advertiser.
One simple solution to stop such spam emails is to create a secondary email address that you can use for such activities. By doing so, those unwanted marketing emails will not appear in your primary email inbox. -
Hide your email address
The more people who expose your email address, the more spam emails you are going to get. So keep your email address hidden from public view. Avoid publishing your primary email address on the web unless it is required. Use alternative email addresses for such scenarios. -
Use a third-party Anti-spam filter
Most of the Anti-spam solutions that are available today can be customized as per your needs, allowing only the approved emails into your inbox. There are free anti-spam software as well as paid anti-spam software.
-
-
@zareen i need help today is extend date please provide sol
50% Off on Your FEE Join US!


