Nt1310 Unit 7 Assignment 1

Improved Essays
Diploma in computing & networking (level 7) Assessment W1: Cryptography Prepared By: Karanjot Singh Deol

Table of Contents 1
Task 1: Cryptography- their methods to do and how it used in IT environment: 1
Cryptography 1
Methods of doing cryptography: 2
Symmetric key Encryption 2
Asymmetric Keyencryption 3
How to secure our encrypted data: 4
Integrity: 4
Overview of cryptography: 6
Conclusion: 6
Task 2: Applications of cryptography in Electronic Transactions and VPNs 7
Cryptography in VPNs 7
Secure Electronic Transactions 9
Task 3: Windows and their authentication methods from NT to Latest Windows Environment? 10
Authentication: 10
Types
…show more content…
As we know cryptography is process of encryption and decryption of our original information into secret message and vice versa. Two famous methods of cryptography are symmetric key and asymmetric key. In symmetric key a common key is used for both encryption and decryption of message. The widely used algorithm for this is DES. Asymmetric key cryptography is much more secure because it used two keys private and public. If message is encrypted with private key then it decrypted only with sender’s public key and vice versa.

Task 3: Windows and their authentication methods from NT to Latest Windows Environment?
Authentication: Authentication is the process to identify the individual. It basically depends upon the username and passwords. In any network authentication is very vital term because security of network is depend upon it. Authentication is responsible to decide who will access the network resources or not.
Types of authentications:

Log on authentication: In this method user confirmed his identity by entering password, inserting smartcard, providing security pin or through voice prompts to log on into the

Related Documents

  • Improved Essays

    Sara Ann Thornley 2/3/17 Macronutrients Dr. Huggins Assignment #1 1. A reducing sugar is a sugar that is capable of breaking down certain substances. They have a free ketone or aldehyde group which allows them to become hemiacetale and hemiketals (Gropper, 65).…

    • 528 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    On october 12, 2015 at or about 1102 hours i was dispatched to 1735 east young circle (publix supermarket), hollywood florida, in reference to a cellphone being taken. Upon further investigation it was later found that the cellphone would equal the amount to grand theft (over $300.00usd). Let it be also noted during the time of this investigation, i was working an off-duty detail at the above location. Upon arrival i made contact with the james othman, herein after referred to as the victim. The victim advised me that at approximately 1051 hours his phone was taken from the customer service counter (located at the south side of the store).…

    • 587 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    BankID [11] allows users to log in into different merchants by using the same password and two-factor authentication. With this, it helps people to save their bank account. This is used in a web site (merchant) when it needs to securely identify its users. Overall the user need to enter their SSN (Social security number), a password, and at the end a one-time password.…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Implementing Firewall Filter Implementing firewall filters on a network makes the network free from attackers and very secured. Some of the boundaries that I will consider using on my firewall will be blocking ports on the network. First of all I will establish a new FTP session which the will initiate a connection to an FTP server that listens on TCP port 21 by default. This will help users on the network to login with user name and password before any data to port 21 will accepted. I will establish SSH(secure shell) which will provide a strong and secure communications over the network.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    C. Services & Applications 1. TRUSTED a) Microsoft Active Directory (AD) Domain: In order to resolve the issues inherent in a peer-to-peer network, a centralized means of user authentication and resource sharing must be implemented. Microsoft Active Directory (AD) is a centrally administered, hierarchical structure designed to manage user access to shared network resources in a domain. Windows Server 2012 R2 Datacenter edition operating system (OS) is required to establish and manage the company’s AD domain.…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    is a software-based protocol that provides a way to locate files, devices or even individual in a network. LDAP uses port 389 and is uses by Microsoft as the main protocol that opens up this type of access. LDAP is lightweight which indicates a smaller version with a smaller code and it is part of X.500. The latter acts as a standard for network directory services. /***************************…

    • 442 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    WSUS is a Windows Server Update Service, that allows the administrators to have a server with Windows updates on site. Administrators can test new updates and approve the successfully tested Windows updates for release. Only the approved updates will be applied to the client computers. Using Group Policy, the administrators can point client computers to WSUS server, so the client computers will only receive the tested and approved updates from this server, instead of receiving all the updates (including potentially harmful updates) from the Windows update web site. This assures, that none of the new Windows updates will create unexpected issues with the clients' systems.…

    • 572 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    SIP Trunking BroadConnect boasts its many years of experience and emphasis on customization. We take every business and design the best phone systems content for it, based on your needs and budget. Since we understand that communication is a major component of a successful business, you will never receive excessive or useless features that will only hinder your company’s ability to grow. Our network is prevalent throughout North America, and it uses converged T1 that is fast and reliable.…

    • 480 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    CIA Triangle

    • 686 Words
    • 3 Pages

    What Is the CIA Triangle and Why Is It Important for Cybersecurity Management? Confidentiality, integrity, and availability, aka the CIA triangle, is a security model designed to guide policies for information security within an organization. The elements of the triad are considered the three most crucial components of security.…

    • 686 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    HOME AREA NETWORK: A SECURITY PERSPECTIVE INTRODUCTION: The interconnection of computers within each other and advantage that go with networking has made a road into every household. due to the reduce in pricing of personal computers(pc) and networking hardware has further helped the household person to intake what is popular termed as home area network(HAN) . With the latest version of operating system that are available in market including network wizards that make configuring home area network very simple for the local people.…

    • 1487 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    From a cybersecurity point of view the use of a private electronic mail (email) server must be justified by promoting the security of the email communications. The great value of email is that it permits exchanging messages between almost any two parties without much more preparation than the exchange of the email addresses of the communicating parties. But Goodrich and Tamassia (2011, pp.500-501) explain that fundamental email protocols do not address authentication, integrity or confidentiality issues of secure communications. Sending email uses the Simple Mail Transfer Protocol (SMTP) which is a text based application layer protocol that can be easily monitored, intercepted and even manipulated by unauthorized agents en route.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Abstract— The focus of this paper is to use Mobile-OTP and QR code in online banking authentication system to provide the best hacker security. Recently, personal information has been leaked through a high degree of methods, such as phishing or pharmacy, to capture user IDs and passwords. This will result in an inappropriate ID / password being propagated between different users; thus a secure user authentication system is essential. In this paper, we use a different technology to provide a secure and easy to use new online banking authentication system Keyword- , OTP, QR code, Android,. I. INTRODUCTION Internet banking is one of the most sensitive tasks that general Internet users perform.…

    • 1446 Words
    • 6 Pages
    Great Essays