This assignment explores information security through a case study involving Peter and Charlie. It examines various tools like brute-force attacks, SSH, and keyloggers, discussing their effectiveness and ethical implications. The analysis emphasizes secure practices and the importance of following company policies.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Information Security Table of Contents
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTRODUCTION Many organizations are there who are using some application software so that they can secure their information at safe place (Peltier, 2013). The present report is based on a case study in which peter is taking some advice from Charlie regarding to the security of information. In this context, some tools are explained which are helpful in ensuring the confidentiality of data. TASK A. No, Charlie was not exaggerated for the time as he just wanted to meet peter face to face so that solution can be identified. Brute force attack is a kind of trial and error method which is used by attackers in order to get the information related to user passphrase (Siponen, Mahmood and Pahnila, 2014). Through this, an individual will be able to decode the encrypted data via using some force attack rather than any other intellectual strategy. In this, all possible passwords are checked by the Peter until they found the correct one. This is a time consuming process so Charlie overemphasised on the time factor in order to crack the encryption code. This kind of method is very fast when an individual checking it for short passcodes. B. There is an another tool like SSH (Secure shell) key authenticate credential which can be used by Peter in order to secure the data by using some encryption technique. The functions of this SSH software are similar as other system like PKI (Public Key Infrastructure (PKI),2017). This can be used for managing as well as transfer of files in an effective manner. This is more cost effective approach and it enhances the security of passwords along with this, it also resembles passphrase. This is primarily used for some automated systems. Through this, data can be recovered in timely manner. C. If Charlie installed a key logger software on all company’s computer systems without prior knowledge of anyone including peter or without any policy authority, then it will act like an ethical violation on the part of Charlie. No, it is not illegal as for such kind of activity the person has to take permission from concerned people. Along with this, Charlie has to follow all policy 1
laws which are made by the company in order ensure the smooth functioning at their work environment. D. Key logger is a kind of software which can be used in order to record the keystroke and any encrypted code. In this, all data can be recorded on immediate basis without taking much time. Yes, it can be stated that there is little while lie on the action which is performed by Charlie. He called Peter after 2 days and this won’t take much time to save the records so it is clear that there is a little lie on the ethical action. So, this is also not secured for the company’s practices. CONCLUSION From the above case study analysis, it can be summarized that some software’s can be used by the company like PKI and SSH in order to secure their data. On the basis of these, they will be able to make an effective encryption system. 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
REFERENCES Books and journal Peltier, T.R., 2013.Information security fundamentals. CRC Press. Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information security policies: An exploratory field study.Information & management.51(2). pp.217-224. Online PublicKeyInfrastructure(PKI).2017.[Online].Availablethrough:< https://www.ibm.com/support/knowledgecenter/en/SSFKSJ_8.0.0/com.ibm.mq.sec.d oc/q009900_.htm>. [Accessed on 2ndOctober 2017]. 3