This Computer Science assignment delves into various aspects of cybersecurity and cryptography. It begins by exploring security theories, using the Hacking Team breach as a case study to illustrate the interplay of victim, motive, and offender, with a focus on ethical hacking, zero-day exploits, and backdoor firmware. The assignment then moves on to auditing, covering the Windows registry and Linux log files, explaining their function and how to analyze them for system information and potential issues. Exercise 3 focuses on the Diffie-Hellman algorithm for key exchange, demonstrating how to initialize variables and develop Python scripts to potentially crack private keys through brute-force attacks and discusses mitigation strategies. Finally, the assignment concludes with an analysis of security and cryptography, including frequency analysis, a common technique used to break classical ciphers by exploiting letter occurrence patterns, and demonstrates this technique with a provided ciphertext. The assignment covers a range of topics from practical system analysis to theoretical cryptographic concepts.