Preview

Lab Answers

Satisfactory Essays
Open Document
Open Document
617 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab Answers
Rodney L. Bennett Jr
ISSC362 Week 1 Lab #2:
Implement Hashing and Encryption for Secure Communications
Instructor Name: _Adam Meyer_

Lab Assessment Questions

1. Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.

The hash file is changed when the data is modified because the information within the file has changed and it is considered a new/different file.

2. Why are the MD5sum and SHA1sum hash values the same every time you calculate for the “example.txt” sample file? What if they were different when you re-calculated the hash value at the other end?

Because the data has not changed and a different hash value is not needed because nothing (data) has changed from the original format/file.
3. 2
4.
3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?

One other security countermeasure to use if I did not want to encrypt e-mail from my corporate account would be to use a digital signature to ensure message integrity. I know this because I use it on a daily basis.

4. If you are using corporate e-mail for external communications that contain confidential information, what other security countermeasure can you deploy to maximize confidentiality of e-mail transmissions through the Internet?

Again, I would utilize a digital signature. I would also use cryptology to maximize confidentiality of e-mail transmissions through the internet from my corporate account.

5. What is the difference between MD5sum and SHA1sum hashing calculations? Which is better and why?

MD5sum is basically a one-way with a max of 128 bits processed for its input while SHA1sum can process up to 512 bits along with padding. I would say that SHA1sum is better due to the fact that padding

You May Also Find These Documents Helpful

  • Satisfactory Essays

    4. They also could use digital signature plus they could use cryptography along with it…

    • 171 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    2. List three suggestions to harden SMTP server security. Backup your Exchange server periodically, Audit your Exchange server, and Digitally sign and Encrypt your Email.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1330 unit 7 assinment1

    • 350 Words
    • 2 Pages

    I can understand how you concerned with your company’s security after all information on competitors can be invaluable or very harmful to a company and this is why it must be protected from prying eyes. This does not have to mean that you have to lose production over trying to secure your networks information. An easy measure like user names and passwords can be used to protect less sensitive information but how strong you make those usernames and passwords can have a significant effect on how well your information is protected. I will give you some tips on how to better secure your network with the tools that you already have at hand, keep in mind that you can also buy better security items to better protect you network things like; smart card, finger print scanners, retinal scanners, etc. but I only recommend these for really sensitive information and only for certain users in your company. On the server that is the DC log in to the administrator account and in the Active Directory Users and Computers in the Domain icon in the left pane click on the users icon, you’ll be able to see all of the users in that domain. From here you can click on any user and make changes as necessary, for user names I recommend you use the following format; using capital and lower case letters the first letter of their name, their whole last name and their employee number, ex. “CCbattle1234@Domain*%#.Local” if someone hack the account and all that they knew the person name and the domain name they could not get in because it is very unlikely that they would know that person employee number and if they do then you have a spy in your company. As for passwords I recommend that they be alpha numeric and what this means is that they should be at least eight characters long, be composed of upper and lower case letters, should contain at least one number and one special character.…

    • 350 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    5. Which of the following holds true while hardening an organizational network through security controls?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Acct 332 Db2

    • 358 Words
    • 2 Pages

    Question 4: Data integrity is essential for a company 's operations. Describe various steps companies can use to ensure the integrity of its information.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Linux Chapter 2

    • 288 Words
    • 2 Pages

    9. What is SHA1? How does it work to ensure that an ISO image file you download is correct?…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Your employees e-mail file attachments to each other and externally through the organization’s firewall and Internet connection. What security countermeasures can you implement to help mitigate the risk of rogue e-mail attachments and URL web links?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    In a business environment it’s essential that you have correct mail handling procedures in order to keep information safe and secure this can be client’s details, account details, personal information of employees etc. This needs to be protected in order to avoid illegal misuse of data and personal information leading to fraudulent activities.…

    • 2151 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    3.1. Explain how to support others to understand the need for secure handling of information…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Law 304 Midterm

    • 804 Words
    • 4 Pages

    3. E-mail accounts of employees that are created through their employer are private only if there is a door that can be closed to ensure others can not see the screen. (Points : 1)…

    • 804 Words
    • 4 Pages
    Better Essays
  • Good Essays

    The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the company’s discretion.…

    • 696 Words
    • 3 Pages
    Good Essays