Nit5140 - information security - victoria university -


Assignment Description

The purpose of this assignment is twofold -

Task 1: In Task 1, students will explore Pretty Good Privacy (PGP) encryption program that provides asymmetric cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.

Task 2: To develop skills to independently think of a situation and apply skills to analyze complex problems in network security under supervision. In this task, students will analyze a recent case in a chosen field. Based on his/her analysis, the student will find out the causes of the breach and will provide a plausible theoretical solution to resolve the case.

Task 1: Pretty Good Privacy (PGP)

Description of the assessment:

This task needs to be completed using the iGolder PGP Freeware tool. A text file with the public key is provided in the assessment folder. Use this key to encrypt the following plain text that can only be decrypted by your tutor, who has the corresponding private key.

Task 2: Critical Thinking

Description of the assessment:

This task consists of three steps - i) field selection ii) find a business case and iii) analyze the business case.

***You should work on your assignment progressively in full co-ordination with your tutor.

Field Selection
In the first step of the assignment, you have to select one of the fields listed below. You should choose your field in consultation with your lab tutor -
- Software Defined Networking
- Internet of Things
- Cloud Network
- Wireless Sensor Network

Finding a Case Study
In this step, you need to find a business case in your chosen field from last two years. The business

case can be of two types -
- A real world example, where a security breach occurs in your chosen field.
- One IEEE Journal, where authors worked toward the security of your chosen field.
Analyzing the Business Case
Analysis depends on the type of your business case -
A Real World Example
If it is a real world example, you need to first write a summary of the case study in your own words. Then you need to clearly identify the security breaches that occurred. Finally, you have to provide a solution that should be taken in future by the respective organization to build a shield against such attacks.

Research Article
You need to write a critical review of the journal that you have identified. The critical review includes - i) Summary of the Paper ii) Strength of the Paper iii) Weakness of the paper.

Task 2 Report Writing Guideline
1. Please download the IEEE Conference Template from the VU Collaborate
2. You need to use the template to write your report
3. The report should be in between 2-3 pages.

Attachment:- Assignment.rar

Request for Solution File

Ask an Expert for Answer!!
Dissertation: Nit5140 - information security - victoria university -
Reference No:- TGS02910305

Expected delivery within 24 Hours