IT security

Subject :- IT security , due 17 April
TASK

A. Essay Questions

Write minimum 600 words for each of the following two short-essay questions. Both the questions are of equal value (25 marks each). You should provide credible references for each question according to the Faculty guidelines. Although there is no rigid maximum word limit, around 850 words maximum, per question will be appropriate.

Question 1

Research the concept of Quantum key distribution (QKD) in the context of information security and report your findings. Your report should include the following details: what quantum key distribution means; quantum key exchange; vulnerabilities of QKD; and future directions of QKD.

Question 2

There are several filtering mechanisms available to examine packets using firewalls. Research various firewall filtering mechanisms and write a short report comparing four popular filtering mechanisms. Use the following criteria for comparison: filtering technique; complexity; usage; and future trends.

B. Hands-on Task

It is a common misconception that HTTPS provides anonymous Web browsing. This is not the case. A secured HTTPS connection can ensure confidentiality (what you’re sending can’t be read by others) and authentication (the website you’re visiting is really who they say they are). However, it does not provide anonymity. Eavesdroppers cannot see what you are sending, but they can see that you are sending something to that website.

Onion routing can provide anonymity via an encrypted network of “relay” servers. Computers around the world pass your fully encrypted traffic. The intermediary relay servers do not know the entire path of the onion network. Requests that come from you appear to originate from around the world. You have complete anonymity. It’s still a good idea to use a secured end-to-end HTTPS connection, because the connection between the last relay server and the site you are visiting is not encrypted.

1. Open a Web browser.
2. Go to http://www.google.com/.
3. Search for “my IP address.”
4. Press Enter.
5. Click on the first result.
6. Take a screenshot showing your IP address.
7. Go to www.TorProject.org.
8. Click Download.
9. Click on the link for Windows 10 (or as appropriate) under Tor Browser Bundle.
10. Save the file in your download folder.
11. Browse to your download folder.
12. Right-click the Tor executable and select “run as administrator.”
13. Click Yes, and Extract.
14. Browse to the C:\security\Tor Browser folder.
15. Right-click the executable labeled “Start Tor Browser.exe” and select “Run as administrator.”
16. Click Yes. (A new Web browser window should open.)
17. Within the Web browser, go to www.Google.com.
18. Search for “my IP address.”
19. Click on the first result. (If you get a warning about an “Untrusted” connection, just click on I Understand the Risks, Add Exception, and Confirm Security Exception.)
20. Take a screenshot showing the new IP address. (This is someone else’s IP address.)

Your submission should include the following:

A report presenting a brief discussion about Tor and an explanation of the two screenshots obtained in Step 6 and Step 20. Include the two screenshots within your report. Use appropriate captions. (Maximum word limit=850)

RATIONALE
back to top
This assessment task will assess the following learning outcome/s:
be able to explain fundamental information security concepts.
be able to discuss and debate some of the security implications of computer networks, including cryptography.
be able to compare and contrast firewall technologies


Buy plagiarism free, original and professional custom paper online now at a cheaper price. Submit your order proudly with us



Essay Hope