Information Security: Peter and Charlie's Case Study Report
VerifiedAdded on 2020/06/03
|5
|698
|36
Report
AI Summary
This report presents an analysis of an information security case study involving Peter and Charlie, focusing on the security of sensitive information. The report explores various security tools and methods, including brute force attacks, SSH key authentication, and keyloggers. It examines the effectiveness of these tools in ensuring data confidentiality and the ethical implications of their use. The analysis delves into the time-consuming nature of brute force attacks, the functionality and cost-effectiveness of SSH, and the ethical violations associated with unauthorized keylogger installations. The conclusion highlights the importance of employing tools like PKI and SSH to establish robust encryption systems and protect organizational data. The report references several academic sources to support its findings.

Information Security
Table of Contents
Table of Contents
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

INTRODUCTION...........................................................................................................................1
TASK...............................................................................................................................................1
A..................................................................................................................................................1
B...................................................................................................................................................1
C...................................................................................................................................................1
D..................................................................................................................................................2
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................3
TASK...............................................................................................................................................1
A..................................................................................................................................................1
B...................................................................................................................................................1
C...................................................................................................................................................1
D..................................................................................................................................................2
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................3

INTRODUCTION
Many organizations are there who are using some application software so that they can
secure their information at safe place (Peltier, 2013). The present report is based on a case study
in which peter is taking some advice from Charlie regarding to the security of information. In
this context, some tools are explained which are helpful in ensuring the confidentiality of data.
TASK
A.
No, Charlie was not exaggerated for the time as he just wanted to meet peter face to face so
that solution can be identified. Brute force attack is a kind of trial and error method which is used
by attackers in order to get the information related to user passphrase (Siponen, Mahmood and
Pahnila, 2014). Through this, an individual will be able to decode the encrypted data via using
some force attack rather than any other intellectual strategy. In this, all possible passwords are
checked by the Peter until they found the correct one. This is a time consuming process so
Charlie overemphasised on the time factor in order to crack the encryption code. This kind of
method is very fast when an individual checking it for short passcodes.
B.
There is an another tool like SSH (Secure shell) key authenticate credential which can be
used by Peter in order to secure the data by using some encryption technique. The functions of
this SSH software are similar as other system like PKI (Public Key Infrastructure (PKI), 2017).
This can be used for managing as well as transfer of files in an effective manner. This is more
cost effective approach and it enhances the security of passwords along with this, it also
resembles passphrase. This is primarily used for some automated systems. Through this, data can
be recovered in timely manner.
C.
If Charlie installed a key logger software on all company’s computer systems without
prior knowledge of anyone including peter or without any policy authority, then it will act like an
ethical violation on the part of Charlie. No, it is not illegal as for such kind of activity the person
has to take permission from concerned people. Along with this, Charlie has to follow all policy
1
Many organizations are there who are using some application software so that they can
secure their information at safe place (Peltier, 2013). The present report is based on a case study
in which peter is taking some advice from Charlie regarding to the security of information. In
this context, some tools are explained which are helpful in ensuring the confidentiality of data.
TASK
A.
No, Charlie was not exaggerated for the time as he just wanted to meet peter face to face so
that solution can be identified. Brute force attack is a kind of trial and error method which is used
by attackers in order to get the information related to user passphrase (Siponen, Mahmood and
Pahnila, 2014). Through this, an individual will be able to decode the encrypted data via using
some force attack rather than any other intellectual strategy. In this, all possible passwords are
checked by the Peter until they found the correct one. This is a time consuming process so
Charlie overemphasised on the time factor in order to crack the encryption code. This kind of
method is very fast when an individual checking it for short passcodes.
B.
There is an another tool like SSH (Secure shell) key authenticate credential which can be
used by Peter in order to secure the data by using some encryption technique. The functions of
this SSH software are similar as other system like PKI (Public Key Infrastructure (PKI), 2017).
This can be used for managing as well as transfer of files in an effective manner. This is more
cost effective approach and it enhances the security of passwords along with this, it also
resembles passphrase. This is primarily used for some automated systems. Through this, data can
be recovered in timely manner.
C.
If Charlie installed a key logger software on all company’s computer systems without
prior knowledge of anyone including peter or without any policy authority, then it will act like an
ethical violation on the part of Charlie. No, it is not illegal as for such kind of activity the person
has to take permission from concerned people. Along with this, Charlie has to follow all policy
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

laws which are made by the company in order ensure the smooth functioning at their work
environment.
D.
Key logger is a kind of software which can be used in order to record the keystroke and any
encrypted code. In this, all data can be recorded on immediate basis without taking much time.
Yes, it can be stated that there is little while lie on the action which is performed by Charlie. He
called Peter after 2 days and this won’t take much time to save the records so it is clear that there
is a little lie on the ethical action. So, this is also not secured for the company’s practices.
CONCLUSION
From the above case study analysis, it can be summarized that some software’s can be used
by the company like PKI and SSH in order to secure their data. On the basis of these, they will
be able to make an effective encryption system.
2
environment.
D.
Key logger is a kind of software which can be used in order to record the keystroke and any
encrypted code. In this, all data can be recorded on immediate basis without taking much time.
Yes, it can be stated that there is little while lie on the action which is performed by Charlie. He
called Peter after 2 days and this won’t take much time to save the records so it is clear that there
is a little lie on the ethical action. So, this is also not secured for the company’s practices.
CONCLUSION
From the above case study analysis, it can be summarized that some software’s can be used
by the company like PKI and SSH in order to secure their data. On the basis of these, they will
be able to make an effective encryption system.
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFERENCES
Books and journal
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information
security policies: An exploratory field study. Information & management. 51(2).
pp.217-224.
Online
Public Key Infrastructure (PKI). 2017. [Online]. Available through: <
https://www.ibm.com/support/knowledgecenter/en/SSFKSJ_8.0.0/com.ibm.mq.sec.d
oc/q009900_.htm>. [Accessed on 2nd October 2017].
3
Books and journal
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information
security policies: An exploratory field study. Information & management. 51(2).
pp.217-224.
Online
Public Key Infrastructure (PKI). 2017. [Online]. Available through: <
https://www.ibm.com/support/knowledgecenter/en/SSFKSJ_8.0.0/com.ibm.mq.sec.d
oc/q009900_.htm>. [Accessed on 2nd October 2017].
3
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.