Assessment Guidelines Situation: Imagine you are a cyber security consultant employed by a client to evaluate the crypto

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Assessment Guidelines Situation: Imagine you are a cyber security consultant employed by a client to evaluate the crypto

Post by answerhappygod »

Assessment Guidelines
Situation:
Imagine you are a cyber security consultant employed by a client
to evaluate the cryptographic weaknesses within their existing
Business Management System (BMS). The client does not foresee any
benefits in transitioning to a more secure algorithm within their
BMS because they believe that other organisational defences within
the existing system would counteract any potential cyber threats.
The client has minimal technical expertise and is therefore unaware
that the existing BMS has an obsolete and thus vulnerable
cryptographic algorithm within it. For confidentiality reasons,
this algorithm is not known to you. This client has requested a
report that would enable them to make an informed decision as to
the benefits of upgrading the BMS.
Background:
Cryptography has continually evolved and become more secure in
line with new vulnerabilities that are being discovered. For this
assessment, you are required to examine and then creatively
demonstrate one vulnerability within an obsolete/legacy
cryptographic algorithm (e.g., RC2, RC4, DES, 3DES, MD2, MD4, MD5,
SHA-1). To complete this assessment successfully, you must address
the core requirements below;
You don’t know the cryptographic algorithm used in the BMS.
Thus, your focus should be on communicating the issues of
obsolete/legacy cryptographic algorithms by focusing
on one cryptographic algorithm. Your
chosen algorithm may focus on either confidentiality or integrity.
The report must be communicated simply, with minimal use of
technical terminology. Avoid complex cryptographic algorithms and
diagrams (e.g., black-box diagrams). Use analogies and create your
own pictures and data flow diagrams to communicate the prominent
themes in a simple manner. Provide both in-text references with
their corresponding end text references correctly formatted in the
APA 7th style.
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply