COMPUTER NETWORK SECURITY

use the vigenere cipher with keyword ‘health’ to encipher the message “life is full of surprises”. please give me the answer.

The use of security information event management (SIEM) software detected that a malware attack originated from an international source. As the cybersecurity analyst of NCU-FSB with critical infrastructure and mission-sensitive information, you have determined that the external hackers have the motivation to cause business disruption. The virus penetrated the enterprise’s IT infrastructure, infecting servers, desktops, and laptops; destroying information; and spreading ransomware. The payload of the virus deleted mission-critical files and changed file extensions for all database files. The attacks have crippled the organization’s ability to make timely business decisions. Further investigation of logs using a security information event management application revealed that there have been significant internal attacks including sniffing, MAC spoofing, WEP/WPA cracking, AP spoofing, and DoS of the company resources due to the weak wireless infrastructure. These attacks have weakened the security posture of the organization.

Write a paper in which you address the malware attack. Your paper should cover the following:

  1. Describe the reasons why web-based applications are vulnerable.
  2. Describe three attacks that can be levied on web servers and their applications.
  3. Recommend strategies that can be used to protect web servers.
  4. Describe the reasons why wireless networks are more vulnerable to attacks than wired networks.
  5. Recommend strategies and tools that can be used to mitigate wireless network attacks.
  6. Suggest risk responses in terms of:
    1. Risk avoidance
    1. Risk acceptance
    1. Risk sharing/transfer
    1. Risk mitigation through the application of industry best principles and practices and information security policies
  7. Monitor the infrastructure for security-related events.
  8. Securing of information assets.

Support your paper with a minimum of five recent (within the past five years) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

Length: 4-6 pages not including titles and reference pages.

Your paper should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy.

Week 5 – Assignment 1: Evaluate the Effectiveness of Malware Protection to Mitigate Risks

Many information security models have had a major impact on the way security services have been developed over the years. Some security models have created significant strategies that have assisted security professionals in resolving security issues, while some have opened backdoors that have led to severe security issues.

For this assignment, create a presentation on the security-related advantages and issues related to the full implementation of the Bell-LaPadula confidentiality model, Biba integrity model, Lipner model, Clark-Wilson model, Brewer-Nash (Chinese Wall) models, and Graham-Denning model in an organization with multiple departments and thousands of users who are exposed to personally identifiable information (PII) in their daily duties. You will also explore and present a table of industry tools that can be implemented to prevent intrusions or malware attacks.

Length: 5- to 7-slide presentation with speaker notes of no fewer than 100 words per content slide, not counting the cover, agenda, and references.

Support your presentation with a minimum of five recent (within the past five years) scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

Your presentation should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy.

Upload your presentation file and click the Submit to Dropboxbutton.

Security Awareness Training Program 

Employee training in security normally is a one-time or annual event. It has been proven that security awareness can be reinforced through the use of posters placed in strategic locations.

  1. Research any computer security threat or a recent attack. Select one element of the threat or attack (e.g., “Clean Desk”).
  2. Design a Security Awareness Training Poster that is simple and compelling (e.g., the WWII poster “Loose Lips Sink Ships”).
  3. Include how to empower trainees to analyze cybersecurity theories and practices in the light of God’s revealed truth and apply professional, ethical, and responsible behaviors to tangible security situations from a Christian worldview.
  4. It should be no longer than 500 words
  5. Include at least two references

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

There are threats all around us, so it is essential to have a robust plan in place to help mitigate the damage to a business from these threats.

1. Select any one of the threats that have been covered in the Business Continuity Chapter of the text and develop a Disaster Recovery Plan (DRP).

2. The plan at a minimum should include a summary of the threat, a risk assessment, a mitigation strategy, how you will restore the IT resource, and contingencies.

3. The DRP should be no longer than 500-750 words.

Prepare this assignment according to the guidelines found in the APA Style Guide.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite.

ment Part B. In this part student will write report discussing following two sections: a) Cryptoperiods A cryptographic key is a value (essentially a random string of bits) that serves as input to an algorithm, which then transforms plain text into ciphertext (and vice versa for decryption). One of the important characteristics that determines key strength is its cryptoperiod [1]. Or the length of time for which the key is authorised for use. 1. From current literature survey, critically analyse and discuss cryptoperiods for hash, symmetric, and asymmetric algorithms. Find at least three sources for each of the algorithms (select two algorithms from each category). 2. Draw a table to list the algorithms and the recommend time, and then calculate the average of each. 3. Provide recommendation on the cryptoperiods for each selected algorithm. b) Cryptographic Transport Protocol Hypertext Transport Protocol Secure (HTTPS) is becoming increasingly more popular as a security protocol for web traffic. Some sites automatically use HTTPS for all transactions

(like Google), while others require that users must configure it in their settings [1]. Use Library/Internet resources to research HTTPS. Based on your research address following: 1. Explain the advantages and disadvantages of HTTPS. How is it different from HTTP? 2. Discuss the server configuration for HTTPS transactions. 3. How does this algorithm protect a guest user communicating over a public Wi-Fi connection? Should all Web traffic be required to use HTTPS? Why or why not? Justify your recommendation. [1] M. Ciampa, Security+ Guide to Network Security Fundamentals, 6th ed. Cengage, 2018. References Must consider at least eight (three for part A and five for part B) current references from journal/conference papers and books. Must follow IEEE referencing style. Assignment Instructions: · Do not use Wikipedia as a source or a reference · Make sure you properly reference any diagrams/ graphics used in the assignment. Task Description In assignment 1, you have successfully implemented the network on eNSP (or Packet Tracer but this may be more complex if you choose to continue with Packet Tracer) and performed important steps to manage the network configuration. In this assignment, you will perform necessary setup to manage the network performance. In particular, you will complete the following tasks: • Task 1: Select a suitable network management architecture to manage the network then implement the architecture using Zabbix NMS and SNMPv2c. • Task 2: Document performance baselining for the network connectivity. • Task 3: A staff member at the branch network reports that she cannot upload documents to a shared folder of the headquarter network document server. Outline the troubleshooting steps you would use to solve this issue. Assignment 2 marking guidelines The following are the major assessment criteria of this assignment Task 1: Network management environment setup • Select a suitable network management architecture and justify the selection. • Correctly configure SNMPv2c on each network device • Successfully verify SNMPv2 setup with snmpwalk utility • Successfully download, configure and run Zabbix appliance.

• Successfully configure Zabbix NMS to discover all network devices Task 2: Performance baselining • Correctly identify performance parameters for baselining • Correctly calculate the baselines of the parameters Task 3: Network troubleshooting • Select a troubleshooting approach and correctly follow the approach • Correctly identify the type of information should be collected at each step • Correctly propose the hypothesis to be tested at each step Format and Presentation Task 1: You are required to record a short video clip (10 min max) to explain your task 1. In the video, you will: • Provide your details e.g. your name, student id, year and the unit you are studying • Explain your selection of the network management architecture and show the implementation of the architecture on eNSP. • Explain your SNMPv2c configuration on a network device • Demonstrate the working SNMPv2c using snmpwalk utility • Demonstrate a working Zabbix NMS that receives SNMP updates from the managed network devices. Finally, publish your video on YouTube. Use the unlisted option if you do not want the video to be viewed in public. Copy the link to your video and paste it under the task-1 section of the document template provided with this assignment. Task 2 and Task 3: Use the template provided with this assignment for this task