代做COMPSCI 316: Cyber Security, Semester 2, 2024 Assignment 3代写数据结构程序

- 首页 >> Algorithm 算法

Assignment 3

COMPSCI 316: Cyber Security, Semester 2, 2024

This assignment is worth 75 marks and counts towards  10% of the course grade.

The submission deadline is Friday, October 18 NZ Time. No late submissions are accepted. The assignment must be submitted through Canvas. The only acceptable format is PDF.

Please keep your answers concise and under 300 words, and you are expected to use APA or IEEEreferencing style. in this assignment.

Note. Sharing assignment solutions does not help in your learning. Consequently, our academic integrity policy does not permit sharing solutions or source code leading to solutions. Violation of this will result in your assignment submission attracting no marks, and you may also face disciplinary actions. Therefore, please do not share assignments, assignment solutions, or source code leading to assignment  solutions. Do not publish or make available your assignments or solutions online, for  you will be liable if someone copies your solution. Please talk to us if you have any doubts about what is legit and what is not.

Do not leave your computers, devices, and belongings unattended — you must  secure these at all times to prevent anyone from accessing your assignments or solutions.

Question I. Anonymous Communication (30 marks)

The company you work for is considering implementing anonymous communication over the Internet. However, there is a lot of debate between the parties involved as to which of the below technologies should be the best fit for the business model.

As a security consultant, you are tasked to present various risks and opportunities associated with the following two technologies: (a) Tor, (b) VPN.

1.  Present a detailed comparative analysis between the above outlined technologies  with respect to the following parameters:     [5 x 3 = 15 marks]

●   Speed

●   Cost

●   Security

●   Accountability

●    Ease of use

2.  Discuss how Tor and VPN can be configured together by explaining the below configurations:                                     [5 x 2 = 10 marks]

●   Tor over VPN

●   VPN over Tor

For each of these configurations, describe the flow of data with a diagram, and present the opportunities and risks associated with the configurations.

3.  Choose one from the below list as your final recommendation, and provide justification for the same.             [5 marks]

●   Tor   ●   VPN

●   Tor over VPN

●   VPN over Tor

State any assumption(s) you have made to answer the question.

Question II. Blockchain Technology (35 marks)

Part I

1.  Explain the role of the following cryptographic primitives in achieving various security goals in blockchain technology.              [3 x 3 = 9 marks]

●   Cryptographic nonce

●   Digital Signature

●   Cryptographic Hashes

For each of the primitives, mention which security goal(s) is/are achieved, and how  they are achieved. State any assumption(s) you have made to answer the question.

2.  Using a diagram, analyse and explain how a distributed ledger works. Explain how it differs from a traditional centralized ledger.                           [3 x 2 = 6 marks]

3.  Explain how blockchain technology prevents ‘double-spending’ attacks, and discuss one potential vulnerability or limitation of this approach.                [5 marks]

Part II

The government of your country is considering introducing a new project named ‘Blockchain-based Healthcare Data Management System’ . This project will involve a decentralised  database of patients’ sensitive data   using  blockchain  technology. Electronic  Health  Records  (EHRs),  comprising  this  data,  will  be  shared  across healthcare organisations across the country, such that healthcare providers, medical technicians, and patients can access the data.

1.  Explain with a data-flow diagram how the decentralised architecture can be designed using blockchain technology.                        [5 marks]

2.  Which type of blockchain should be used for the privacy of patients’ data? Justify   your answer.                        [5 marks]

3.  Explain the advantages and disadvantages of introducing blockchain technology in healthcare.                                [5 marks]

State any assumption(s) you have made to answer the above questions.

Question III DoS Attacks (10 marks)

1.  The organisation you work for is planning to implement ‘anti-spoofing’ and

‘directed broadcast filters’ to safeguard their servers against Denial of Service

(DoS) attacks. As a cybersecurity consultant, you have been tasked with

presenting a risk analysis report both pre- and post-implementation of these

measures. This report must include whether the servers remain susceptible to

any type of DoS attacks after implementing the above filters, and if so, suggest countermeasures that could be taken to reduce them.                        [8 marks]

State any assumption(s) you have made to answer the question.

2.  Explain how ‘ Hidden Services’ can be used to protect against DDoS attacks. [2 marks]





站长地图