Cryptography And Computer Security : Process Of Preventing

Question:
Define the Cryptography and Computer Security of Process of Preventing.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
 
Answer:
Introduction

Computer security is the most – primary concern these days for any organization. Computer security is a process of preventing, detecting the system from any unauthorized use or any Threat. Computer Security has become an integral part of computer and Information Technology. At present we all keep our all details digital on our system or on server, due to increase use of Internet and several other threats computer has become prone to any kind of problems related to security (Christian W. Pst, Jeffrey .Hr, Matt. B, Dieter .G,2012).

Concerns in computer security

Confidentiality of Data in computer systems- Confidentiality comes at the top of the priority of the security requirements. To maintain the confidentiality of the Computer , there should be provision that no unauthorized person can access information..

Integrity of data in computer Systems- There should be provision that only authorized person can bring any updating in the system.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Availability-  The information on the system should be available to the user whenever it is required  and there should be no information loss.

Authentication- There should be proper mechanism to control and check whether the information flow is at between correct ends or not.

Statistics of Computer Security Threats

Computer Threats-

According to the reports of the   cyber security cell our systems are now more prone to unauthorized intrusions. These intrusions can be trying to access information without permission, introduction of Malicious programs in the system such as virus in our system  attack by Hackers and other threats.

 According to the report published by research centres the most  high Threats  for year 2015-2016 are-     

Mobile Security & Smartphone Vulnerability Threats-

As most of the websites are giving information in their specialized version for Smart Mobiles and Mobile devices like Tablets etc. , and as  they are easy to carry and access information most of the people are using mobiles these days for their work. At present attacks on the mobile systems is the primary threat now.

Phishing Attacks & Social Engineering

In this type of Security attack the Hacker or attacker attacks Emails or Malicious websites  to collect personal details of the individuals. It is also called Social Engineering Attack as in this type of security threat the attacker take use of Human Interaction for obtaining information about personal, organization or the system architecture.

Identity Theft

Another Threat that has become predominant is theft of identity, by unauthorized accessing  of ID , password and other details. In  this  type  of attack the attacker imposes ownself by collecting personnel information and uses them in their own purposes. For example after getting Bank account details one can transfer money and other, this is most dangerous threat.

Our selected Mitigation for  Attack

Mitigation of the Mobile Attacks-

In order to Mitigate the  Mobile attacks following practices should be performed-

  • By using advance security software in mobiles.
  • By using advance password methods.
  • By using Advance techniques of Locking.
  • By applying auto scan and clean up property.
  • By applying filters on web use.
  • By restricting popups and other threats.
  • Regular scanning and check.

Conclusion-Computer security has become a major issue these days. There are several attacks these days which has increased our problems even more. In this digital age we cannot survive without computer systems. In order to mitigate the security problems , first and very first is to be alert and to  work on systems by taking security concerns.  It is required to use advance software’s for the security of the system. Using Spywares these days is also essential.  Besides software’s it is also  necessary to get updated of the latest threats, their types and their impact. One should not pass personal details on websites without conforming each details. One should also use digital signatures, retina password, Finger password instead of simple passwords.

 
2. Generate keys of 2 different sizes for RSA encryption scheme and include these keys in the report.

Implementation-

[email protected]:~# ssh [email protected]

[email protected]‘s password:

Linux kali 3.7-trunk-amd64 #1 SMP Debian 3.7.2-0+kali6 x86_64

The programs included with the Kali GNU/Linux system are free software;

the exact distribution terms for each program are described in the

individual files in /usr/share/doc/*/copyright.

Kali GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent permitted by applicable law.

[email protected]:~# ssh-keygen

Generating public/private rsa key pair.

Enter file in which to save the key (/root/.ssh/id_rsa):

Enter passphrase (empty for no passphrase):

Enter same passphrase again:

Your identification has been saved in /root/.ssh/id_rsa.

Your public key has been saved in /root/.ssh/id_rsa.pub.

The key fingerprint is:

eb:63:b6:89:a3:74:dd:76:9f:ea:7f:1e:d4:d4:ba:9b [email protected]

The key’s randomart image is:

+–[ RSA 2048]—-+

|                 |

|                .|

|                o|

|               o.|

|        S     …|

|       . o    .. |

|    . . o o . .. |

|   . ..o+o . . +o|

|    …++o .ooEo.|

+—————–+

Check the key files and estimate the number of decimal digits of the keys and write your estimates.

Implementation-

[email protected]:~ openssl rsa -text -noout -in id_rsa

ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDDo2xko99piegEDgZCrobfFTvXUTFDbWT

ch4IGk5mk0CelB5RKiCvDeK4yhDLcj8QNumaReuwNKGjAQwdENsIT1UjOdVvZOX2d41/p6J

gOCD1ujjwuHWBzzQvDA5rXdQgsdsrJIfNuYr/+kIIANkGPPIheb2Ar2ccIWh9giwNHDjkXT

JXTVQ5Whc0mGBU/EGdlCD6poG4EzCc0N9zk/DNSMIIZUInySaHhn2f7kmfoh5LRw7RF3c2O

5tCWIptu8u8ydIxz9q5zHxxKS+c7q4nkl9V/tVjZx8sneNZB+O79X1teq7LawiYJyLulUMi

OEoiL1YH1SE1U93bUcOWvpAQ5 [email protected]

[email protected]:- echo”AAAAB3NzaC1yc2EAAAADAQABAAABAQDDo2xko99piegEDgZC” | openssl base64 -d | hd

00000000  00 00 00 07 73 73 68 2d  72 73 61 00 00 00 03 01  |….ssh-rsa…..|

00000010  00 01 00 00 01 01 00 c3  a3 6c 64 a3 df 69 89 e8  |………ld..i..|

00000020  04 0e 06 42   |…B|

Encrypt a file (text or binary) using 2 key sizes and include your results and note the observation

Implementation-

[email protected]:~ openssl genrsa -out private.pem 1024

 [email protected]:-openssl rsa -in private.pem -out public.pem -outform PEM –pubout

[email protected]:- $ echo ‘Sky has no limit’ > bob.txt

$ openssl rsautl -encrypt -inkey public.pem -pubin -in bob.txt -out bob.ssl

$ openssl rsautl -decrypt -inkey private.pem -in file.ssl -out decrypted.txt

$ cat decrypted.txt

Sky has no limit.

Explain why GPG encryption and decryption are quite fast.

Solution-

GPG encryption technique uses the two keys for encryption , instead of one. It compress4s the message and also make it more secure. It creates one –time only session key, uses the session key to encrypt the message. It provides high level signature facility. It uses the combination of best conventional and modern cryptography techniques.

Create a file of close to 1 GB and encrypt and decrypt it and note the time taken. Comment on the reason why this much time has taken. Calculate how long it would take to do the encryption/decryption of a 10 GBs of data.

Implementation-

root @kali:- fallocate -l 10G gentoo_root.img

[email protected]: time openssl < opensslcmds.txt-

Export your public key and discuss the reason why your exported key should be in ASCII format.

Solution-

The Public key is kept in ASCII format beacouse it provides convenience in transferring information on Web Pages and emails.

Encrypt a file and output the cipher text in ASCII format. Explain when you need cipher text in ASCII format.

Solution – ASCII is most well understood and accepted coding format, so in order  to send data on any kind of platform and in case of requirement of high security the ASCII Code is best.

h) You should work with your class fellow to do this experiment and record your observation in the form of commands being used or procedure being followed and include your results.

Exchange your public key and your friend’s public key using email.

Implementation

alice% gpg –list-keys

/users/alice/.gnupg/pubring.gpg

Import your friend’s public key into your key ring.

alice% gpg –import blake.gpg

gpg: key 9E98BC16: public key imported

gpg: Total number processed: 1

gpg:               imported: 1

alice% gpg –list-keys

/users/alice/.gnupg/pubring.gpg

III.  Encrypt a file using your friend’s public key and send the encrypted file to your friend.

alice% gpg –output doc.gpg –encrypt –recipient [email protected] doc

Ask your friend to decrypt the encrypted file.

blake% gpg –output doc –decrypt doc.gpg

Write a reflection report in 100 words about the role cryptography can play in ensuring right to privacy of individuals.

The role cryptography can play in ensuring right to privacy of individuals.

These days we are living in IT age , all our documents, information has become digitized, This has brought a wider change in information processing but with this the information has become prone to hacking and other risks.  Security of data is has become the primary concern for every organization at present. To make our information more secure a most promising technique “Cryptography “ is implied. Technically the Cryptography implies converting  the information in a secured format of specialized codes. The whole data is converted in a specialized format, this is called encryption and reconverting the encrypted data in the original form is termed as Decryption. These days Cryptography technique uses the techniques such as Microdots, merging words with images, hiding information in storage and other advance methods. The goal of the Cryptography is to provide confidentiality, Integrity and most importantly the non-Repudiation.   So from the above discussion we can conclude that cryptography no doubt provides the insurance to the right of privacy to an individual (Prakash C. G, 2015).

 
References

Christian W. Pst, Jeffrey .Hr, Matt. B, Dieter .G,(2012), Insider Threats in Cyber Security, Springer Publication

Joseph. M. K, (2015), Guide to Computer Network Security, Springer Publication

 Behrouz A .F, Debdeep .M, (2014), Cryptography and Network Security (SIE),

McGrew Hill Publication

 Prakash C. G, (2015), Cryptography and  Network  Security,  PHI Publication

 Willie L. P, David.S,  (2013), Kali Linux Cookbook, Pact Publisher

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP