University | Republic Polytechnic (RP) |
Subject | C235: IT security |
Question 1
Johnny is considering using the backup plan shown in Table 1a to backup important data on a server for the month of August. The backup is scheduled at 7.30 pm from Monday to Friday. There is no backup on Saturday and Sunday. The backup type and backup tape used are given in Table 1a.
Hire a Professional Essay & Assignment Writer for completing your Academic Assessments
Native Singapore Writers Team
- 100% Plagiarism-Free Essay
- Highest Satisfaction Rate
- Free Revision
- On-Time Delivery
Table 1a: Backup Plan A
Sunday | Monday | Tuesday | Wednesday | Thursday | Friday | Saturday |
1
Full Backup (Tape 1) |
2
Incremental Backup (Tape 2) |
3
Incremental Backup (Tape 3) |
4
Incremental Backup (Tape 4) |
5
Incremental Backup (Tape 5) |
6 | |
7 | 8
Full Backup (Tape 1) |
9
Incremental Backup (Tape 2) |
10
Incremental Backup (Tape 3) |
11
Incremental Backup (Tape 4) |
12
Incremental Backup (Tape 5) |
13 |
14 | 15
Full Backup (Tape 1) |
16
Incremental Backup (Tape 2) |
17
Incremental Backup (Tape 3) |
18
Incremental Backup (Tape 4) |
19
Incremental Backup (Tape 5) |
20
; |
21 | 22
Full Backup (Tape 1) |
23
Incremental Backup (Tape 2) |
24
Incremental Backup (Tape 3) |
25
Incremental Backup (Tape 4) |
26
Incremental Backup (Tape 5) |
27
; |
28 | 29
Full Backup (Tape 1) |
30
Incremental Backup (Tape 2) |
31
Incremental Backup (Tape 3) |
a. Describe a problem if Johnny uses a rotation scheme where Tape 1, Tape 2,…, Tape 5 are re-used very every week. Explain your answer
b. Explain what should be done if the Grandfather-Father-Son (GFS) rotation is used. Your explanation should include the number of tapes required and how long should the tapes be preserved.
c. How many tapes are required to do a full restore of the server’s data if the server’s data is corrupted on the following days:
- 8 August at 6.00 pm
- 10 August 7.00 pm
- 16 August at 7.15 pm
Explain your answer and your explanation should include the sequence of the tapes required for the data restoration for each of the three days.
Question 2
Johnny is also considering using RAID 0, RAID 5, or RAID 6 for their server.
a. For the choice of RAID configuration, Johnny has the budget to use up to 6 disks of 1000 GB each and he also wants to achieve an amount of usable disk storage of 4,000GB. Which is the best RAID configuration he should use? Explain your answer.
RAID | Capacity per disk | No. of disks required |
RAID 0 | 1000GB | 4000GB/1000GB = 4 disks |
RAID 5 | 1000GB | 4000GB/(1000 * 75%) = 5 disks |
RAID 6 | 1000GB |
b. To save cost, should Johnny choose the RAID configuration that requires the least number of disks to achieve the amount of usable disk storage of 4,000GB? Explain your answer.
Question 3
Hash values of the following files (File W, File X, File Y and File Z) are recorded from Sunday till Friday using a special type of hash algorithm.
Filename | Sunday | Monday | Tuesday | Wednesday | Thursday | Friday |
File W | ZZZT789 | ZZZT789 | ZZZT789 | ZZZT789 | ZZZT789 | ETYUO90 |
File X | OOOUIO3I | OOOUIO3I | TYJK89PP | TYJK89PP | YYUI9067 | TTYYWW7 |
File Y | MMMU89E | HI89OPTC | SERT677L | SERT677L | SERT677L | SERT677L |
File Z | GGG34UIT | GGG34UIT | GGG34UIT | FFGUI456 | FFGUI456 | FFGUI456 |
Three backup types are considered to backup File W, File X, File Y, and File Z that reside in a system. A different backup tape is used each day, labelled Tape 1, 2, …, 6. For each day, backup is scheduled at 9 pm and will complete by 10 pm.
Day | Type 1 | Type 2 | Type 3 |
Sunday (Tape 1) | Full backup | Full backup | Full backup |
Monday (Tape 2) | Full backup | Incremental backup | Differential backup |
Tuesday (Tape 3) | Full backup | Incremental backup | Differential backup |
Wednesday (Tape 4) | Full backup | Incremental backup | Differential backup |
Thursday (Tape 5) | Full backup | Incremental backup | Differential backup |
Friday (Tape 6) | Full backup | Incremental backup | Differential backup |
a. Which backup type(s) is/are used if Tape 4 at 10.30 pm contains File Z? Explain your answer.
b. Which backup type(s) is/are used if Tape 5 at 10.30 pm contains File X, File Y, File Z? Explain your answer
c. For the backup type identified in b), which backup tape(s) should be used to restore the file(s) if the system is corrupted on Friday at 11.30 pm?
d. For backup Type 2, which file(s) is/are in Tape 3 on Tuesday at 11.45 pm? Explain your answer.
Buy Custom Answer of This Assessment & Raise Your Grades
Question 4
Roland and 6 other team members are working on a confidential project. On average, each one of them would send information to the rest of the team individually 5 times a day. They would like to adopt one of the following 3 cryptosystems for a trial to protect the information they send to each other. The trial period is 2 days long.
Cryptosystem 1:
Symmetric cryptosystem with a unique key shared between each pair.
Cryptosystem 2:
Asymmetric cryptosystem with digital signature
Cryptosystem 3:
Hybrid cryptosystem without digital signature (A new session key would be generated for each communication)
Which cryptosystem would require the
a. most number of keys
b. the least number of keys
Show your calculations.
Question 5
The plaintext is encrypted using Cipher 1 to produce a ciphertext which is then encrypted using Cipher 2 to produce another ciphertext. The different combinations of Cipher 1 and Cipher 2, and ciphertext produced (Ciphertext I, Ciphertext II, …, or Ciphertext VI) are given in the table below:
Combination | Cipher 1 | Cipher 2 | Ciphertext |
1 | Columnar Transposition Cipher with keyword = BUG | Caesar Cipher with key=14 | Ciphertext I |
2 | Caesar Cipher with key=14 | Vigenere Cipher with key=GGGGGG | Ciphertext II |
3 | Vigenere Cipher with key=W | Vigenere Cipher with key=YYYYY | Ciphertext III |
4 | Vigenere Cipher with key=H | Vigenere Cipher with key=TAKEN | Ciphertext IV |
5 | Rail Fence Transposition Cipher with key = 7 | Columnar Transposition Cipher with keyword = BUG | Ciphertext V |
6 | Vigenere Cipher with key=RIVER | Caesar Cipher with key= 19 | Ciphertext VI |
a. Which ciphertext(s) can be decrypted by frequency analysis technique? Explain your answer.
b. Can you determine the highest frequency letter of the ciphertexts? For those that you can determine, state the highest frequency letter. Explain your answer.
Question 6
Password A is either 6,7 or 9 characters long and is formed from the following characters:
Qq C C D k l m a b c d A B C D e i o u X Y Z
Password B is also either 6, 7 or 8 characters long and is formed from the following characters:
W w C d F f g H H L l m n P Q R r S T U V Z
Computer I and Computer II, are used to crack these passwords. The computer I used was Brute Force Attack. Computer II used Dictionary Attack with 100,000,000 English words dictionary. The computer I can check 1,000,000 passwords per second and Computer II can check 500,000 passwords per second.
a. If characters can be repeated for Password A, what is the total number of possible passwords for Password A? Show your work.
b. If characters cannot be repeated Password B, what is the total number of possible passwords for Password B? Show your working
c. What is the highest maximum time needed to crack Password A using Computer II? Explain your answer.
d. Which computer is more likely to crack password B? Explain your answer.
Stuck with a lot of homework assignments and feeling stressed ? Take professional academic assistance & Get 100% Plagiarism free papers
Hire the information security assignment writers to complete your C235: IT security Assignment. we have highly experienced and skilled academic assignment experts who have more than 10 years of experience in providing quality help on IT Assignments. Our experts work 24*7 to offer you 100% plagiarism free solution at a cheap price.
Looking for Plagiarism free Answers for your college/ university Assignments.
- Mobile Learning App Evaluation Report Assignment: Usability, Design, and Learning Outcome Analysis
- CTA Psychotherapy Intervention Essay Assignment: Sheila Case Study on Managing Anxiety and Marital Stress
- DSM500 Machine Learning Project Proposal: Retail Sales Forecasting with Time Series Models
- Project Management Assignment 2: The Shard UK Case Study on Risk & Stakeholder Strategies in Construction Projects
- CSIT121 Banking Application Assignment: OOP-Based Customer & Account Management System in Python
- PSB333MAE Assignment 1 Report: Structural Analysis & Optimisation Using SolidWorks and Direct Stiffness Method
- Economics Assignment Questions: Factors of Production, Demand Behavior & Global Coffee Market
- GSGM 7223 Strategic Transformation Assignment: Global Foods Ltd Case Study on Change Management and Digital Innovation
- PAC Research Proposal Report Assignment 1: Accounting and Finance Topics
- 7025CL Management Report Assignment: Investment Appraisal and Cash Budgeting – A Financial Feasibility Study for Gamiquest Corporation