Security Engineering/Cryptography

Security Engineering/Cryptography

Please respond to at least two main topics by Friday. Respond to at least two classmates by Sunday.

Topic

Threads

Posts

Last Post

Domain 3 – Security Engineering/Cryptography



Must post first.

After reading this week’s materials, please respond to one or more of the following questions.

  1. Define steganography and discuss a method of how steganography is accomplished.
  2. What is a cryptosystem and what services can cryptosystems provide? Give an example of a cryptosystem and describe its operation.
  3. Describe the operation of a one-time pad (OTP) and give an example of a device that uses an OTP either from your own experience or from research.
  4. What are the types of message integrity controls and what benefit is provided by them? Give a short description of the various secure email protocols that are referenced in the textbook.
  5. What benefit do digital signatures provide and what are their characteristics? In your own words, what does non-repudiation mean?
  6. What factors affect the strength of an algorithm or cryptosystem? What are some common weaknesses that affect them?
  7. Describe the functions of key management. What is a key escrow?

You must start a thread before you can read and reply to other threads

Domain 3 – Security Engineering/Site and Facility Security



Must post first.

After reading this week’s materials, please respond to one or more of the following questions.

  1. Identify the malicious threat sources to physical security and their corresponding countermeasures.
  2. What is a “man-trap”? What is the difference between “fail-safe” and “fail-secure” configurations in how doorways with automatic locks operate?
  3. Define the following different types of voltage fluctuations possible with electric power: spike, surge, fault, blackout, sag/dip, brownout, and in-rush current. Describe electromagnetic interference (EMI) and radio frequency interference (RFI) and discuss sources of each.
  4. Describe the four main classes of fire in relation to the type of fire, elements of fire they are associated with, and the suppression method used to mitigate them. List the four main combustion elements and align them with the appropriate suppression method.
  5. Describe the differences between the four main types of water sprinkler systems used for fire suppression.

You must start a thread before you can read and reply to other threads

Hashing – A Hands on Approach



An MD5 hash is 128 bits.

A SHA1 hash is 160 bits.

A sha256 hash is 256 bits.

A sha384 hash is 384 bits.

A sha512 hash is 512 bits.

Discuss some of the different types of hashes and indicate some good hashing tools for Linux and Windows. Are they command line tools or GUI tools?

What does a hash prove? Why are hashes often used for download links?

Here is a list of some hashes. You may elect to see if you can identify the name of the files associated with these hashes and explain what these files do as part of the discussion.

53245DB399AE003E82FDECB0871E66D3

E72A495A8E4AF5D09B9400CAF014D3D7

E0FB946C00B140693E3CF5DE258C22A1

57F0839433234285CC9DF96198A6CA58248A4707

9FBFE673241D831242219F158720DE3D

B32189BDFF6E577A92BAA61AD49264E6

3B1333F826E5FE36395042FE0F1B895F4A373F1B

899BCDA15D5D03A968373B7081D9121F

D3F39F5D391E9D2CE7EF8D11C429D0A3