For more course tutorials visit
www.newtonhelp.com
Cumulative Review of Cryptography Concepts
Complete the following exercises. Save the document with your last name and submit it to the Assignment Files tab.
1. Review the following packet capture. Describe what the information identified by the yellow arrow in the packet capture section represents. Describe what is generally transpiring in the communication.
1. CMGT 432 Cumulative Review of Cryptography Concepts
For more course tutorials visit
www.newtonhelp.com
Cumulative Review of Cryptography Concepts
Complete the following exercises. Save the document with your last
name and submit it to the Assignment Files tab.
1. Review the following packet capture. Describe what the
information identified by the yellow arrow in the packet capture
section represents. Describe what is generally transpiring in the
communication.
2. Review the following packet capture. Describe what the
information identified by the yellow arrow in the packet capture
section represents. Describe what is generally transpiring in the
communication.
3. The following graphic represents a small piece of a larger traffic
capture. Based on the information, describe what this traffic generally
represents. Some of the traffic includes the acronym RSA. What is
RSA in detail, as related to the image?
4. Review the following graphic and describe its significance to
cryptography.
5. Describe what is transpiring in the following graphic.
6. Describe in detail what the following equation pertains to in
cryptography. Include what is being solved and why.
7. Describe the process occurring in the following example:
8. Describe the significance of the area in the packet capture noted
by the yellow arrow. What is occurring? What type of system does
2. this communication originate from? Also, why would this system
increase the security posture of an organization?
9. This question consists of completing multiple activities.
Activity #1
Complete the steps below:
Step 1: Create a file called secrets.txt and place text of your choice in
it (it is better to place a large amount of text in it).
Step 2: Copy it to your hard disk and take note of its location.
Step 3: Take an image file in .jpg format, placing it in the same
directory as the text file just created, renaming it cool.jpg.
Step 4: Take note that this is merely an example and you must
provide the proper paths and spacing.
copy /b cool.jpg + secrets.txt output.jpg
Activity #2
Answer the following questions:
What is this operation an example of?
What could have been used to detect this activity?
10. Describe the differences between the following terms:
Stream versus block ciphers
Asymmetric versus symmetric encryption
AES versus DES versus 3DES
IKE versus ISAKMP
HTTP versus HTTPS
===============================================
CMGT 432 Entire Course
For more course tutorials visit
www.newtonhelp.com
Cumulative Review of Cryptography Concepts
3. Complete the following exercises. Save the document with your last
name and submit it to the Assignment Files tab.
1. Review the following packet capture. Describe what the
information identified by the yellow arrow in the packet capture
section represents. Describe what is generally transpiring in the
communication.
2. Review the following packet capture. Describe what the
information identified by the yellow arrow in the packet capture
section represents. Describe what is generally transpiring in the
communication.
3. The following graphic represents a small piece of a larger traffic
capture. Based on the information, describe what this traffic generally
represents. Some of the traffic includes the acronym RSA. What is
RSA in detail, as related to the image?
4. Review the following graphic and describe its significance to
cryptography.
5. Describe what is transpiring in the following graphic.
6. Describe in detail what the following equation pertains to in
cryptography. Include what is being solved and why.
7. Describe the process occurring in the following example:
8. Describe the significance of the area in the packet capture noted
by the yellow arrow. What is occurring? What type of system does
this communication originate from? Also, why would this system
increase the security posture of an organization?
9. This question consists of completing multiple activities.
Activity #1
Complete the steps below:
Step 1: Create a file called secrets.txt and place text of your choice in
it (it is better to place a large amount of text in it).
Step 2: Copy it to your hard disk and take note of its location.
Step 3: Take an image file in .jpg format, placing it in the same
directory as the text file just created, renaming it cool.jpg.
Step 4: Take note that this is merely an example and you must
provide the proper paths and spacing.
copy /b cool.jpg + secrets.txt output.jpg
Activity #2
4. Answer the following questions:
What is this operation an example of?
What could have been used to detect this activity?
10. Describe the differences between the following terms:
Stream versus block ciphers
Asymmetric versus symmetric encryption
AES versus DES versus 3DES
IKE versus ISAKMP
HTTP versus HTTPS
===============================================
CMGT 432 Week 1 Cryptography Timeline Presentation
For more course tutorials visit
www.newtonhelp.com
Cryptography has been around for over a thousand years. Throughout
these years, technology and time have impacted the importance of
protection through cryptography.
Develop a high-level timeline that identifies 15 important events in
cryptography over the past 2,000 years.
The timeline should be in chronological order and include the major
milestones focused on ancient versus modern cryptographic systems
and techniques.
Include the following in each milestone:
Date of the event (specific date of event, when possible)
Who or what triggered the event
Who was impacted by the event
5. The student may use any tool, such as Microsoft® Word, Publisher, or
PowerPoint®, and sites such as ReadWriteThink, Timeline JS,
or timetoast, etc., to develop the timeline. The timeline must include
at least 15 events over the past 2,000 years.
===============================================
CMGT 432 Week 2 Applying Encryption Standards
For more course tutorials visit
www.newtonhelp.com
CMGT 432 Week 2 Applying Encryption Standards
===============================================
CMGT 432 Week 2 Password Encryption Tools
For more course tutorials visit
www.newtonhelp.com
CMGT 432 Week 2 Password Encryption Tools
===============================================
CMGT 432 Week 3 Recommend PKI Technology
6. For more course tutorials visit
www.newtonhelp.com
CMGT 432 Week 3 Recommend PKI Technology
===============================================
CMGT 432 Week 3Digital Certificates Presentation
For more course tutorials visit
www.newtonhelp.com
CMGT 432 Week 3 Digital Certificates Presentation
===============================================
CMGT 432 Week 4 Analyzing Encrypted E-Mail
Communication
For more course tutorials visit
www.newtonhelp.com
7. CMGT 432 Week 4 Analyzing Encrypted E-Mail Communication
===============================================
CMGT 432 Week 4 Exploiting Public Wireless Networks
For more course tutorials visit
www.newtonhelp.com
You are part of a security team at a large corporation. Recently, a
colleague asked why there is a policy against using public wireless
networks with their company laptops. You explain that hackers use
software to steal and analyze network traffic on public wireless
networks. To demonstrate your point, you show your colleague how
hackers exploit public wireless networks.
Download Wireshark (http://www.wireshark.org/download.html), or
any other packet analysis tool.
Configure and use your chosen packet analysis tool to analyze
wireless network traffic. Only capture legally permissible traffic such
as your own home wireless traffic.
Create a presentation based on your observations.
Include the following in your presentation:
Screenshots of the steps taken to download, install, and use a
packet capture utility.
Identified unencrypted traffic in captures.
Identified encrypted traffic in captures, as well as ciphers.
8. The differences in encrypted versus unencrypted traffic, as well
as available plain text.
Use Microsoft® PowerPoint or any other slide presentation tool of
your choice.
Provide detailed speaker notes to explain bullet points. The speaker
notes should be well-formatted and easy to read, not just a single
paragraph of text. All slides must be scripted and include APA
citations as needed.
===============================================
CMGT 432 Week 5 Team SSL TLS Packet Capture
For more course tutorials visit
www.newtonhelp.com
CMGT 432 Week 5 SSL TLS Packet Capture
===============================================