Posted: April 8th, 2015

Cyberspace and Cybersecurity

CSEC 610 9027 Cyberspace and Cybersecurity

Answer all questions

1. Read the article and answer the following questions.

a. Research a threat modeling tool that you consider is best to model threats to information systems. Provide a diagram of the modeling tool similar to Figure 1 in the article. (2 pts)

b. Rewrite the section 3.1 “Threat Modeling” (with no less than 200 words) in your own words according to the modeling tool you’ve just discovered. (2 pts)

c. Research a risk assessment tool that you consider is best to assess risks of information systems. Provide an example of the interface similar to Figure 2 in the article.  (2 pts)

b. Rewrite the section 3.2 “Risk Assessment” (with no less than 200 words) in your own words according to the risk analysis tool you’ve just discovered.  (2 pts)

e. Add a section 3.5 on Cyber “Advanced Persistent Threat – APT” (with no less than 200 words) and discuss its tactics, techniques and procedures. (2 pts)

2. Apple’s new iPhone data encryption that makes NSA and law enforcement agencies worry about whether they can still break into phones during investigation even with a court order.

The new phone encrypts emails, photos and contacts based on a complex mathematical algorithm that uses a code created by, and unique to, the phone’s user. Breaking the code, could take more than 5 1/2 years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers. [Excerpt]

David E. Sanger and Brian X. Chen. (Sep. 26, 2014) Signaling Post-Snowden Era, New iPhone Locks Out N.S.A. The NY Times. Retrieved from http://nyti.ms/YmQz0l (The article is attached.)

a. Read the full article, do research on the subject and discuss the technologies behind the new iPhone encryption. (2 pts)

b. State and fully discuss your opinion (support or against) about the adoption of the iPhone encryption. (2 pts)

c. Following Apple, Google will have its Android operating system with encryption by default. But as we know Google can still collect your data from Gmail. So do other free email services like Yahoo and Hotmail.

Suppose you have a full-time job in cybersecurity. If there is an email service charging $40 a year but does not collect your data. Are you willing to switch to this email service or would you rather stay in the current free email services by scarifying your privacy? (2 pts)

d. This question is hidden/encrypted in the attached picture named img.jpg. You need to decrypt this picture to get the question (in text.txt file).   (4 pts)
Hint: To decrypt the picture, you may access the virtual lab and use the same tool as you have used in week 6 (topic 2). This time, you need to save the picture, copy this image file (img.jpg) to the c:encrypt folder to replace the original file already there on the virtual machine. Run the encrypt.exe you will see a text file comes out. The newly generated/decrypted text file is the question.
Need help? Contact LAs or your professor.

Attachments:

1. Threat assessment and risk mitigation article for question 1
•    A Novel Cyber Thread Assessment Algorithm

2. Attachment for question 2 (iPhone encryption)
•    Signaling Post-Snowden Era, New iPhone Locks Out N.S.A

3. Attachment for question #2d (encryption/decryption)
•    img.jpg

These files can also be access from: http://polaris.umuc.edu/csec/csec610/exam_resources15.html

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Live Chat+1-631-333-0101EmailWhatsApp