OUA SP4 COSC2651 Security in Computing and IT Assignment 2

Verified

Added on  2022/08/18

|3
|619
|13
Homework Assignment
AI Summary
This assignment solution for Security in Computing and IT (COSC2651/CPT251) addresses various aspects of cybersecurity. Task 1 explores techniques for deciphering encrypted messages, including automated and manual approaches, along with estimations of decryption time and methods to enhance or hinder the process. Task 2 analyzes the effectiveness of different security mechanisms (proxy server, IPSec, backups, and anomaly-based intrusion detection) against various threats like key loggers, spyware, CPU/resource stealing, poisoned search results, clickjacking, phishing, password cracking, person-in-the-middle attacks, and ransomware. The analysis evaluates the effectiveness of each mechanism against each threat, providing detailed reasoning. The assignment also includes questions on cryptography, authentication, and security mechanisms.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Security in Computing and IT
Security in Computing and IT
Name of the Student
Name of the University
Authors note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1SECURITY IN COMPUTING AND IT
Task 4.2
Based on the Student ID  3587225 mod 3 = 2
Mechanism 1 (Proxy
Server)
Mechanism 2 (IPSec) Mechanism 3 (Backups) Mechanism 4 (Anomaly-
based intrusion detection)
Threat 1: Key loggers Not Effective because it
can be used by the
hacker to send its
collection
Very effective because it
can restrict user to read
messages by
encapsulating data
packets
Very effective because it
cannot access data from
backup
Partially effective it can
address the login
password and username
but cannot address the
firewall rules
Threat 2: Spyware Not Effective because it
can run continuously in
background and allow
remote access from
infected computers
Mostly effective since it
can be used for
malicious purpose and
are of different types for
stealing information but
cannot address from
being installed in a
system
Not effective because it
can delete backups or
corrupt files
Partially effective it can
address monitoring of
system usage but cannot
address installation and
is difficult to detect
Threat 3: CPU/resource
stealing
Not effective because it
can restrict the access of
the remote users
Partially effective it can
address the security but
cannot address access of
server replies
Not effective since
backup cannot be used
for improving
performance
Very effective since it
can detect the impact
Threat 4: poisoned search
results
Very effective because it
acts as an intermediate
and direct access of the
server is restricted
Not effective because the
user can get redirected
to malicious sites
Partially effective
because the user can be
affected but the data can
be restored
Very effective because
the malicious websites
can be detected and
blocked
Threat 5: clickjacking Mostly effective because
it can block the attacker
form accessing the host
but cannot address
blocking of UI
redressing
Not effective the site can
display the malicious
objects
Not effective because the
confidential information
can get already disclosed
Partially effective
because the embedded
script or code can be
detected but cannot
address blocking
Threat 6: Phishing Not effective because it is
a passive attack and the
user can input their
details
Not effective because it is
a passive attack and the
user can input their
details
Not effective because it is
a passive attack and the
user can input their
details
Very Effective because
the links can be checked
or blocked for
restricting the access
Threat 7: password
cracking
Very effective because
the hacker would not
have access to the
physical server
Partially effective
because it encrypts
application layer data
and used standard
algorithm for encrypting
packet but cannot
address internal threats
Not effective because the
passwords can be
cracked from backup
causing the system
vulnerable
Not effective because
passwords can be
cracked using different
machine causing the
system vulnerable
Threat 8: person in the
middle attack
Not effective because the
identity of the
sender/receiver is forged
Very effective because
the messages are sent in
encapsulated form such
Not effective because the
data can be used for
Very effective because
traffic captured can be
used for determining
Document Page
2SECURITY IN COMPUTING AND IT
that it cannot be
decrypted
breaking confidentiality source
Threat 9: ransomware Moderately because it
can block the attacker to
reach the destination
server but cannot block
from being exploited
Not effective because the
access of the system is
manipulated
Very effective because it
can be used for restoring
the system
Partially effective
because it can detect the
source but cannot
restrict it
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]