Preview

Dil Will Pyar

Satisfactory Essays
Open Document
Open Document
380 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dil Will Pyar
Total marks: 12 + 08 = 20 Deadline = 27-06-13
Rules for Marking
It should be clear that your assignment will not get any credit if:
1. The assignment is submitted after due date.
2. The assignment is copied.

Objectives
The objectives of this assignment are: ▪ Giving the idea of the message security. ▪ To become familiar with the safe and secure transactions. ▪ To enhance skills regarding understanding of different encryption techniques.

Question No. 1

Consider that ABC University is well reputed and highly ranked university among other universities of the world.

Suppose Mr. Omer is the country coordinator in Pakistan’s campus of ABC University situated in Australia. Another campus of the same university is in Dubai.
From his system in Pakistan, Mr. Omer communicates with both offices via e-mail messages and other means of communication messaging over the internet. For secure communication different cryptographic techniques have been used on the internet.

Mr. Omer shares confidential information every day with the higher management sitting in Australia & Dubai campuses. Any data outflow and hacking can cause downfall of the University, so a secure communication is needed among all campuses.

Let’s say that the messaging is done by implementing the public key cryptography under the digital signature technology. There are number of processes done on sender and receiver side to secure the messages and keep them safe from hackers.

Now answer the below questions from the above mentioned scenario;

i. How the authenticity at Mr. Omer’s side will be checked by the receiver side in Australia & Dubai?

ii. Original Message of Mr. Omer will be scrambled at sender side before sending on the internet, there is a term digitally signed used for scrambled message. When does a message called as “Signed digitally”?

iii. A person

You May Also Find These Documents Helpful

  • Satisfactory Essays

    External Mail Services

    • 536 Words
    • 3 Pages

    Internal mail services are used to communicate within the council which is free of charge and a lot quicker.…

    • 536 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be…

    • 1444 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Sending a message is much like a letter in that it is put inside another message that contains the source and destination addresses. If these are not correct the message cannot be sent. This process of putting one message format within another message format is called encapsulation. On the destination end, De-encapsulation will occur when the recipient will reverse the process by…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    This lab demonstrated how hashing tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. Common hashing and encryption tools, including MD5, SHA1, and GnuPG, were used. You used GnuPG to generate both a public and private key and a secret key for encryption only.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    There are certain things that the sender needs to take into account at this stage.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Final Paper Introduction

    • 578 Words
    • 2 Pages

    First invented in the 1950s by the United State Military during the Cold War, the dynamics of the Internet have gone through a complete transformation. The World Wide Web combined with modern day technology including smart phones, tablet, and laptops, every corner in the globe is open for instant communication. Moreover, combine the ease of use with the…

    • 578 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    the principles of secure information system use and the responsibility of users to follow them.…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Message sent – individual sends the message i.e speaking or sign what they want to communicate.…

    • 973 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Health Care Communication

    • 1854 Words
    • 8 Pages

    E-mail communication is an electronic mail system that allows almost instant written messages to be sent to the receiver (Merriam-Webster, 2011). Even though e-mail is an electronic form of communication, it creates a written record of the communication. Written records are valuable with health care communications, and e-mail communication…

    • 1854 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    America Is Still on Top

    • 1512 Words
    • 7 Pages

    not as successful as American’s Universities. Also he talks about the private universities in other…

    • 1512 Words
    • 7 Pages
    Good Essays
  • Good Essays

    3. If you want secure e-mail communications without encrypting an e-mail message, what other security countermeasure can you deploy to ensure message integrity? You can deploy to ensure message integrity is by using digital signatures, whether it is encrypted or not,…

    • 392 Words
    • 2 Pages
    Good Essays