Re: CS315 Assignment 1 Solution and Discussion
Assignment No. 01
Semester: Spring 2020
Network Security-CS315 Total Marks: 20
Due Date: 29-May, 2020
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if:
The assignment is submitted after due date.
The assignment is not in the required format (doc or docx).
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc).
To enhance the learning capabilities of students about Network Security Requirements and Algorithms.
Question 1: Marks 14
Carefully analyze the scenarios/problems mentioned below and suggest the most suitable security requirements that should be fulfilled by the organizations to overcome their respective problem(s).
ABC Bank is providing credit card services to its clients. One of its clients Mr. Amir lost his credit card and he received an email of credit card transaction from the bank.
XYZ Soft wants to check that which employee has accessed their system after office working hours but it is unable to trace the employee because organization don’t keep any system logs.
ITC University is providing access to its students of their results through online portal but one of its students is executing scripts to access the server again and again that causes the server to get down.
A student takes admission in the university. After a year, university found that student’s actual information is not matching with the information entered in the university’s database.
A doctor in a hospital detected that one of its patient’s information has been altered by one of the medical staff who was not authorized to access that information.
Glass Soft is providing online gaming facility to end users but one of its employees leaked the information and now users getting spam messages.
Chatbot organization is providing online chatting services to its users. It’s two users A and B are chatting with each other while some user C is sending message to A while pretending that it’s B.
Question 2: Marks 06
Given tables contain the combinations of Plain text, Cipher text and Key Stream. You are required to discover Cipher text and Key stream in binary form while Plain text in decimal form with the help of stream cipher algorithm using following data:
a) Given plain text and key stream. Discover Cipher Text (binary).
b) Given cipher text and key stream. Discover Plain Text (decimal).
c) Given plain text and cipher text. Discover Key Stream(binary).