Professional Writers
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Fill the order form details - writing instructions guides, and get your paper done.
Posted: May 11th, 2022
Security Questions
Instructions: Answer all questions in a single document. Then submit to the appropriate assignment folder. Each response to a single essay question should be about a half-page in length (about 150 words).
1. Cryptographicalgorithmsprovidetheunderlyingtoolstomostsecurity protocols used in today’s infrastructures. The choice of which type of algorithm depends on the goal that you are trying to accomplish, such as encryption or data integrity. These algorithms fall into two main categories: symmetric key and asymmetric key cryptography. In this essay, please discuss the strengths and weaknesses of symmetric key cryptography and give an example of where this type of cryptography is used. Then discuss the strengths and weaknesses of asymmetric key cryptography and give an example of where this type of cryptography is used.
2. Cryptography has been used in one form or another for over 4000 years and attacks on cryptography have been occurring since its inception. The type of people attempting to break the code could be malicious in their intent or could just be trying to identify weaknesses in the security so that improvements can be made. In your essay response, define cryptanalysis and describe some of the common cryptanalytic techniques used in attacks.
3. Many people overlook the importance of physical security when addressing security concerns of the organization. Complex cryptography methods, stringent access control lists, and vigilant intrusion detection/prevention software will be rendered useless if an attacker gains physical access to your data center. Site and facility security planning is equally important to the technical controls that you implement when minimizing the access a criminal will have to your assets. In your essay response, define CPTED and describe how following the CPTED discipline can provide a more aesthetic alternative to classic target hardening approaches. Make sure that the three CPTED strategies are covered in your response.
Security Questions
Question 1: Cryptographic algorithms
Strengths and weaknesses of symmetric key cryptography
Symmetric key cryptography is a cryptographic algorithm method that uses the same key to encrypt and decrypt. The strengths of symmetric key cryptography include being incredibly secure due to the ability to apply a secure algorithm based on designated Advanced Encryption Standards. The extremity in terms of security of the symmetric key cryptography is provided by a 256-bit key length, which makes it impossible for even the fastest computer in the world to break the key. The strength of symmetric key cryptography is that it is relatively fast and provides an easy decrypting process and encrypting (Lander, 2020). The weaknesses of symmetric key cryptography include difficulties in sharing the key, and it can results in more damage if one side in two-way encrypted communication is damaged. Symmetric key cryptography can be used in embedded technology such as One Time Pad.
Strengths and weaknesses of asymmetric key cryptography
The asymmetric key cryptography is applied in conducting communication over insecure channels, to create a cryptographically secure channel. The strength of asymmetric includes high scalability since it does not require exchanging keys, which eliminates the key distribution problem and therefore making it more secured (Miller, 2016: 2024 – Do my homework – Help write my assignment online). The disadvantage of the asymmetric key cryptography is that it is very slow in generating fresh, strong keys and very slow in the encrypting process.
Question 2: Cryptography
Cryptanalysis entails the process of studying cryptographic systems to identify weaknesses or information leaks. The study involves a mathematical analysis of codes, ciphers, and related algorithms in the cryptography to create and improve the encryption codes, algorithms, or ciphers. Several cryptanalysis techniques used in attacks exist, with the common including ciphertext-only attack, whereby the attacker uses frequency analysis to attack the encrypted message that is only known since the attacker knows nothing about the plaintext data. Another common attack technique is a known-plaintext attack, whereby the attacker has access to some or all of the ciphertext and plaintext. The attacker uses the known plaintext and the matching ciphertext to discover the key used in encrypting and decrypting the message (Rouse, 2020). Another common cryptanalytic technique used in attacks is the chosen-plaintext attack. The attacker attempts to gain access to the target encryption device and runs different pieces of plaintext through the device to encrypt it. The last common cryptanalytic technic used by attackers is man-in-the-middle attacks. The attack occurs by the attacker position himself in the communication channel, gaining the ability to intercept the key exchange between two communicating parties on a secured line. The attacker obtains the key when it is communicated between parties to encrypt or decrypt messages or communication.
Question 3: Crime Prevention Through Environmental Design (CPTED)
Crime Prevention Through Environmental Design (CPTED) is defined as a multidisciplinary approach that aims at deterring criminal behavior by focusing on changing how places within the target environment are laid out, how they look, and how they feel. CPTED consists of three strategies: natural access control, territorial reinforcement, and natural surveillance (Deutsch, 2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). Natural access control involves decreasing the opportunity for a crime by denying access to crime targets and creating risk perspective to offenders. Natural surveillance involves the increase of awareness by residents or visibility increase of the building for users who us or enter the property, minimizing the ability of a person to commit the crime without being seen. Lastly, territorial reinforcement strategy design features that indicate proprietorship to perceive a territorial influence on offenders.
Target hardening is the application of mechanical devices that make an area hard to access, such as locks, alarms, monitoring systems, and security systems. Despite target hardening making an area harder to access, the approach tends to make the inhabitants feel unsafe. Therefore, the use of CPTED strategies is considered effective and less threatening.
References
Deutsch, W. (2019: 2024 – Online Assignment Homework Writing Help Service By Expert Research Writers). Crime Prevention Through Environmental Design. The Balance. Retrieved from https://www.thebalancesmb.com/crime-prevention-through-environmental-design-394571
Lander, S. (2020). Advantages & Disadvantages of Symmetric Key Encryption. Leaf Group. Retrieved from https://itstillworks.com/create-pgp-key-5815935.html
Miller, B. (2016: 2024 – Do my homework – Help write my assignment online). Pros and Cons of Asymmetric Encryption. Green Garage. Retrieved from https://greengarageblog.org/8-pros-and-cons-of-asymmetric-encryption
Rouse, M. (2020). Cryptanalysis. TechTarget. Retrieved from https://searchsecurity.techtarget.com/definition/cryptanalysis#:~:text=Other%20types%20of%20cryptanalytic%20attacks,into%20using%20a%20weakened%20cryptosystem.
You Want Quality and That’s What We Deliver
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.
Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.
When you decide to place an order with Nurscola, here is what happens: