Question
The School of Computing and Mathematical Sciences (CMS) at the University of Greenwich (UoG) has decided to set up a locally-hosted website for cybersecurity assessment
The School of Computing and Mathematical Sciences (CMS) at the University of Greenwich (UoG) has decided to set up a locally-hosted website for cybersecurity assessment of computing devices such as computers and smart phones within UoG. The school believes the website can be used to enhance the security of data sharing among the devices. Users of the website will be encouraged to use the website and provide feedback on any gaps or enhancements.
A trial run of the above website was undertaken with lecturers and students all of whom were polled for their feedback regarding 'any gaps or enhancements'. It became clear that such users were mostly concerned about confidentiality and integrity issues in communications between lecturers with lecturers and lecturers with students. Many suggested the use of encryption, hashing and steganography as possible useful technologies. The management therefore decided to seek your help, as a current MSc student, in answering SOME questions about these technologies.
Perform the following tasks based on the background.
- Draw a detailed network diagram of the School of CMS to show the data exchange between computing devices and the website. In this case, the computing devices are accessing the website.
- Manually assign an IP address and a MAC address to every item (such as the computing devices) on the network to support secure data sharing in the network.
- Using the network diagram, show the traces of secure data sharing in the network and explain considerations for assigning such IP addresses
- Using any wide-accepted network packet analyser tool (e.g., Wireshark), explain two threats to the security of data sharing between two computing devices in the network and briefly state how these threats could be mitigated.
Step by Step Solution
3.32 Rating (146 Votes )
There are 3 Steps involved in it
Step: 1
Answer Creating a detailed network diagram and providing IPMAC addresses for every item in the netwo...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started