List the areas you would need access to and the methods


Problem

Case Study 7.1

For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a location that you would like to physically infiltrate. List the areas you would need access to and the methods you would use to get access given the list of different security controls that could be in place. Also, provide examples of ways you would avoid detection if confronted by someone at the location you are trying to infiltrate.

Case Study 7.2

For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a use for Base64 that involves the sending of encrypted letters. List some of the reasons you would need to use Base 64 and the methods you would use to send Base 64 messages Also, provide examples of ways you would avoid detection if confronted by someone who gained access to your Base 64 encrypted letters..

Lab # 7-1 Base 64 Encoding and Decoding

This lab will familiarize the student with the use of Base 64 Encoding. The student will create a text file using one of the file editors (Nano, Vi, or Emacs), then the student will encode the file using base 64. The student will then save the encoded file to a test file. Once the file is encoded the student will then decode the using the base 64 decode command.

Then the student will write a report on the process of base 64 encoding and decoding

Lab # 7-2 Base 64 Encoding and Decoding (Scripting)

This lab will allow the student to create a script that will run the base 64 coder command "n" number of times and then allow for decoding "n" number of times upon request.

Then the student will write a report on the process of base 64 encoding and decoding using a script.

The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: List the areas you would need access to and the methods
Reference No:- TGS03128739

Expected delivery within 24 Hours