Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The School of Computing and Mathematical Sciences (CMS) at the University of Greenwich (UoG) has decided to set up a locally-hosted website for cybersecurity assessment

The School of Computing and Mathematical Sciences (CMS) at the University of Greenwich (UoG) has decided to set up a locally-hosted website for cybersecurity assessment of computing devices such as computers and smart phones within UoG. The school believes the website can be used to enhance the security of data sharing among the devices. Users of the website will be encouraged to use the website and provide feedback on any gaps or enhancements. 

A trial run of the above website was undertaken with lecturers and students all of whom were polled for their feedback regarding 'any gaps or enhancements'. It became clear that such users were mostly concerned about confidentiality and integrity issues in communications between lecturers with lecturers and lecturers with students. Many suggested the use of encryption, hashing and steganography as possible useful technologies. The management therefore decided to seek your help, as a current MSc student, in answering SOME questions about these technologies.

Perform the following tasks based on the background. 

  1. Draw a detailed network diagram of the School of CMS to show the data exchange between computing devices and the website. In this case, the computing devices are accessing the website.
  2. Manually assign an IP address and a MAC address to every item (such as the computing devices) on the network to support secure data sharing in the network.
  3. Using the network diagram, show the traces of secure data sharing in the network and explain considerations for assigning such IP addresses  
  4. Using any wide-accepted network packet analyser tool (e.g., Wireshark), explain two threats to the security of data sharing between two computing devices in the network and briefly state how these threats could be mitigated.

Step by Step Solution

3.32 Rating (146 Votes )

There are 3 Steps involved in it

Step: 1

Answer Creating a detailed network diagram and providing IPMAC addresses for every item in the netwo... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Operations And Supply Chain Management

Authors: Roberta S. Russell, Bernard W. Taylor

8th Edition

978-1-118-7999, 9781118800188, 1118738543, 1118800184, 978-1118738542

More Books

Students also viewed these Computer Network questions