CS204 Assignment 2 Solution and Discussion


  • Cyberian's Gold

    Re: CS204 Assignment 2 Solution and Discussion

    Assignment No. 02
    

    Semester:Spring 2020
    Cyber Law – CS204

    Total Marks: 15

    Due Date:16/06/2020
    Objective:

    • The objective of this assignment is to enhance the knowledge of the students about cryptography technique for security purposes and cyber security measures.

    Uploading instructions:

    • Your assignment must be in .doc or .docx format (Any other formats like scan images, pdf, bmp, etc will not be accepted).
    • Save your assignment with your ID (e.g. bc020200786.doc).
    • No assignment will be accepted through email.

    Rules for Marking:

    It should be clear that your assignment will not get any credit if:
    • The assignment is submitted after due date.
    • The submitted assignment does not open or file is corrupted.
    • Your assignment is copied from internet, handouts or from any other student
    • Assignment is covered from lectures 04 to 06.
    For any query about the assignment, contact at [email protected]

    Assignment Questions

    Questions: Marks 15

    Question.1 (10 Marks)

    Use the caesar cipher method to encrypt the following words with shift key of 3 and show the complete process step by step.

    • “ASSIGNMENT”
    • “TOOLS”

    Question. 2 (5 Marks)

    Suppose that if you’ve ever tried to login to your online bank account and find that not all of your savings are being accounted for, it could be an indication that you’ve been targeted by cyber criminal. Although there are several ways that cyber criminals could have gotten your account data, there’s a fair chance you’ve accidentally come across a phishing website in the past, misinterpreting the login page of your online bank. Enlist all possible security measures to protect your online banking account from cyber criminals.

    Best of Luck


  • Cyberian's Gold

    @zaasmi said in CS204 Assignment 2 Solution and Discussion:

    Suppose that if you’ve ever tried to login to your online bank account and find that not all of your savings are being accounted for, it could be an indication that you’ve been targeted by cyber criminal. Although there are several ways that cyber criminals could have gotten your account data, there’s a fair chance you’ve accidentally come across a phishing website in the past, misinterpreting the login page of your online bank. Enlist all possible security measures to protect your online banking account from cyber criminals.

    1. Respond as if the network has already been breached. Adopting this mindset forces the IT team to prioritize the most business-critical parts of the network and use network segmentation as a strategy. When done correctly, network segmentation, achieved through the creation of network zones, limits the ability for a hacker to move laterally across a compromised network. Network segmentation requires continual updates and configurations, but it can mean the difference between a hacker getting only as far as an employee’s infected computer and helping themselves to the bank’s ATM systems.
    2. Implement an enterprise-wide security policy. A well-defined security policy serves as a crucial road map for any bank IT team to maintain a truly adaptive security architecture. It’s what helps the people tasked with protecting the bank’s systems determine the best way for the network to operate with minimal risk. Additionally, the security policy should take into consideration all regulatory and enterprise compliance requirements and how to apply timely patches to maintain compliance.
    3. Security policy enforcement. It’s one thing to have a security policy that defines how the IT platform behaves and another to actually validate that it is being enforced across your network. Doing the former but not the latter might allow you to comply with some regulations, but it won’t make your network safer. Organizations must constantly monitor their network for changes to configurations and ensure that these changes are approved and compliant with policy. It’s a collaborative effort across the enterprise—network operations, security operations, and the CIO.

  • Cyberian's Gold

    This post is deleted!

  • Cyberian's Gold

    @zaasmi said in CS204 Assignment 2 Solution and Discussion:

    Question.1 (10 Marks)
    Use the caesar cipher method to encrypt the following words with shift key of 3 and show the complete process step by step.
    • “ASSIGNMENT”
    • “TOOLS”

    “ASSIGNMENT”
    Ciphertext
    DVVLJQPHQW

    “TOOLS”
    WRROV


  • Cyberian's Gold

    please share idea



Quiz 100% Result Quiz 100% Result
| |