Information Security: Peter and Charlie's Case Study Report

Verified

Added on  2020/06/03

|5
|698
|36
Report
AI Summary
This report presents an analysis of an information security case study involving Peter and Charlie, focusing on the security of sensitive information. The report explores various security tools and methods, including brute force attacks, SSH key authentication, and keyloggers. It examines the effectiveness of these tools in ensuring data confidentiality and the ethical implications of their use. The analysis delves into the time-consuming nature of brute force attacks, the functionality and cost-effectiveness of SSH, and the ethical violations associated with unauthorized keylogger installations. The conclusion highlights the importance of employing tools like PKI and SSH to establish robust encryption systems and protect organizational data. The report references several academic sources to support its findings.
Document Page
Information Security
Table of Contents
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION...........................................................................................................................1
TASK...............................................................................................................................................1
A..................................................................................................................................................1
B...................................................................................................................................................1
C...................................................................................................................................................1
D..................................................................................................................................................2
CONCLUSION................................................................................................................................2
REFERENCES................................................................................................................................3
Document Page
INTRODUCTION
Many organizations are there who are using some application software so that they can
secure their information at safe place (Peltier, 2013). The present report is based on a case study
in which peter is taking some advice from Charlie regarding to the security of information. In
this context, some tools are explained which are helpful in ensuring the confidentiality of data.
TASK
A.
No, Charlie was not exaggerated for the time as he just wanted to meet peter face to face so
that solution can be identified. Brute force attack is a kind of trial and error method which is used
by attackers in order to get the information related to user passphrase (Siponen, Mahmood and
Pahnila, 2014). Through this, an individual will be able to decode the encrypted data via using
some force attack rather than any other intellectual strategy. In this, all possible passwords are
checked by the Peter until they found the correct one. This is a time consuming process so
Charlie overemphasised on the time factor in order to crack the encryption code. This kind of
method is very fast when an individual checking it for short passcodes.
B.
There is an another tool like SSH (Secure shell) key authenticate credential which can be
used by Peter in order to secure the data by using some encryption technique. The functions of
this SSH software are similar as other system like PKI (Public Key Infrastructure (PKI), 2017).
This can be used for managing as well as transfer of files in an effective manner. This is more
cost effective approach and it enhances the security of passwords along with this, it also
resembles passphrase. This is primarily used for some automated systems. Through this, data can
be recovered in timely manner.
C.
If Charlie installed a key logger software on all company’s computer systems without
prior knowledge of anyone including peter or without any policy authority, then it will act like an
ethical violation on the part of Charlie. No, it is not illegal as for such kind of activity the person
has to take permission from concerned people. Along with this, Charlie has to follow all policy
1
Document Page
laws which are made by the company in order ensure the smooth functioning at their work
environment.
D.
Key logger is a kind of software which can be used in order to record the keystroke and any
encrypted code. In this, all data can be recorded on immediate basis without taking much time.
Yes, it can be stated that there is little while lie on the action which is performed by Charlie. He
called Peter after 2 days and this won’t take much time to save the records so it is clear that there
is a little lie on the ethical action. So, this is also not secured for the company’s practices.
CONCLUSION
From the above case study analysis, it can be summarized that some software’s can be used
by the company like PKI and SSH in order to secure their data. On the basis of these, they will
be able to make an effective encryption system.
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and journal
Peltier, T.R., 2013. Information security fundamentals. CRC Press.
Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information
security policies: An exploratory field study. Information & management. 51(2).
pp.217-224.
Online
Public Key Infrastructure (PKI). 2017. [Online]. Available through: <
https://www.ibm.com/support/knowledgecenter/en/SSFKSJ_8.0.0/com.ibm.mq.sec.d
oc/q009900_.htm>. [Accessed on 2nd October 2017].
3
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]