University | Republic Polytechnic (RP) |
Subject | C235: IT security |
Question 1
Johnny is considering using the backup plan shown in Table 1a to backup important data on a server for the month of August. The backup is scheduled at 7.30 pm from Monday to Friday. There is no backup on Saturday and Sunday. The backup type and backup tape used are given in Table 1a.
Hire a Professional Essay & Assignment Writer for completing your Academic Assessments
Native Singapore Writers Team
- 100% Plagiarism-Free Essay
- Highest Satisfaction Rate
- Free Revision
- On-Time Delivery
Table 1a: Backup Plan A
Sunday | Monday | Tuesday | Wednesday | Thursday | Friday | Saturday |
1
Full Backup (Tape 1) |
2
Incremental Backup (Tape 2) |
3
Incremental Backup (Tape 3) |
4
Incremental Backup (Tape 4) |
5
Incremental Backup (Tape 5) |
6 | |
7 | 8
Full Backup (Tape 1) |
9
Incremental Backup (Tape 2) |
10
Incremental Backup (Tape 3) |
11
Incremental Backup (Tape 4) |
12
Incremental Backup (Tape 5) |
13 |
14 | 15
Full Backup (Tape 1) |
16
Incremental Backup (Tape 2) |
17
Incremental Backup (Tape 3) |
18
Incremental Backup (Tape 4) |
19
Incremental Backup (Tape 5) |
20
; |
21 | 22
Full Backup (Tape 1) |
23
Incremental Backup (Tape 2) |
24
Incremental Backup (Tape 3) |
25
Incremental Backup (Tape 4) |
26
Incremental Backup (Tape 5) |
27
; |
28 | 29
Full Backup (Tape 1) |
30
Incremental Backup (Tape 2) |
31
Incremental Backup (Tape 3) |
a. Describe a problem if Johnny uses a rotation scheme where Tape 1, Tape 2,…, Tape 5 are re-used very every week. Explain your answer
b. Explain what should be done if the Grandfather-Father-Son (GFS) rotation is used. Your explanation should include the number of tapes required and how long should the tapes be preserved.
c. How many tapes are required to do a full restore of the server’s data if the server’s data is corrupted on the following days:
- 8 August at 6.00 pm
- 10 August 7.00 pm
- 16 August at 7.15 pm
Explain your answer and your explanation should include the sequence of the tapes required for the data restoration for each of the three days.
Question 2
Johnny is also considering using RAID 0, RAID 5, or RAID 6 for their server.
a. For the choice of RAID configuration, Johnny has the budget to use up to 6 disks of 1000 GB each and he also wants to achieve an amount of usable disk storage of 4,000GB. Which is the best RAID configuration he should use? Explain your answer.
RAID | Capacity per disk | No. of disks required |
RAID 0 | 1000GB | 4000GB/1000GB = 4 disks |
RAID 5 | 1000GB | 4000GB/(1000 * 75%) = 5 disks |
RAID 6 | 1000GB |
b. To save cost, should Johnny choose the RAID configuration that requires the least number of disks to achieve the amount of usable disk storage of 4,000GB? Explain your answer.
Question 3
Hash values of the following files (File W, File X, File Y and File Z) are recorded from Sunday till Friday using a special type of hash algorithm.
Filename | Sunday | Monday | Tuesday | Wednesday | Thursday | Friday |
File W | ZZZT789 | ZZZT789 | ZZZT789 | ZZZT789 | ZZZT789 | ETYUO90 |
File X | OOOUIO3I | OOOUIO3I | TYJK89PP | TYJK89PP | YYUI9067 | TTYYWW7 |
File Y | MMMU89E | HI89OPTC | SERT677L | SERT677L | SERT677L | SERT677L |
File Z | GGG34UIT | GGG34UIT | GGG34UIT | FFGUI456 | FFGUI456 | FFGUI456 |
Three backup types are considered to backup File W, File X, File Y, and File Z that reside in a system. A different backup tape is used each day, labelled Tape 1, 2, …, 6. For each day, backup is scheduled at 9 pm and will complete by 10 pm.
Day | Type 1 | Type 2 | Type 3 |
Sunday (Tape 1) | Full backup | Full backup | Full backup |
Monday (Tape 2) | Full backup | Incremental backup | Differential backup |
Tuesday (Tape 3) | Full backup | Incremental backup | Differential backup |
Wednesday (Tape 4) | Full backup | Incremental backup | Differential backup |
Thursday (Tape 5) | Full backup | Incremental backup | Differential backup |
Friday (Tape 6) | Full backup | Incremental backup | Differential backup |
a. Which backup type(s) is/are used if Tape 4 at 10.30 pm contains File Z? Explain your answer.
b. Which backup type(s) is/are used if Tape 5 at 10.30 pm contains File X, File Y, File Z? Explain your answer
c. For the backup type identified in b), which backup tape(s) should be used to restore the file(s) if the system is corrupted on Friday at 11.30 pm?
d. For backup Type 2, which file(s) is/are in Tape 3 on Tuesday at 11.45 pm? Explain your answer.
Buy Custom Answer of This Assessment & Raise Your Grades
Question 4
Roland and 6 other team members are working on a confidential project. On average, each one of them would send information to the rest of the team individually 5 times a day. They would like to adopt one of the following 3 cryptosystems for a trial to protect the information they send to each other. The trial period is 2 days long.
Cryptosystem 1:
Symmetric cryptosystem with a unique key shared between each pair.
Cryptosystem 2:
Asymmetric cryptosystem with digital signature
Cryptosystem 3:
Hybrid cryptosystem without digital signature (A new session key would be generated for each communication)
Which cryptosystem would require the
a. most number of keys
b. the least number of keys
Show your calculations.
Question 5
The plaintext is encrypted using Cipher 1 to produce a ciphertext which is then encrypted using Cipher 2 to produce another ciphertext. The different combinations of Cipher 1 and Cipher 2, and ciphertext produced (Ciphertext I, Ciphertext II, …, or Ciphertext VI) are given in the table below:
Combination | Cipher 1 | Cipher 2 | Ciphertext |
1 | Columnar Transposition Cipher with keyword = BUG | Caesar Cipher with key=14 | Ciphertext I |
2 | Caesar Cipher with key=14 | Vigenere Cipher with key=GGGGGG | Ciphertext II |
3 | Vigenere Cipher with key=W | Vigenere Cipher with key=YYYYY | Ciphertext III |
4 | Vigenere Cipher with key=H | Vigenere Cipher with key=TAKEN | Ciphertext IV |
5 | Rail Fence Transposition Cipher with key = 7 | Columnar Transposition Cipher with keyword = BUG | Ciphertext V |
6 | Vigenere Cipher with key=RIVER | Caesar Cipher with key= 19 | Ciphertext VI |
a. Which ciphertext(s) can be decrypted by frequency analysis technique? Explain your answer.
b. Can you determine the highest frequency letter of the ciphertexts? For those that you can determine, state the highest frequency letter. Explain your answer.
Question 6
Password A is either 6,7 or 9 characters long and is formed from the following characters:
Qq C C D k l m a b c d A B C D e i o u X Y Z
Password B is also either 6, 7 or 8 characters long and is formed from the following characters:
W w C d F f g H H L l m n P Q R r S T U V Z
Computer I and Computer II, are used to crack these passwords. The computer I used was Brute Force Attack. Computer II used Dictionary Attack with 100,000,000 English words dictionary. The computer I can check 1,000,000 passwords per second and Computer II can check 500,000 passwords per second.
a. If characters can be repeated for Password A, what is the total number of possible passwords for Password A? Show your work.
b. If characters cannot be repeated Password B, what is the total number of possible passwords for Password B? Show your working
c. What is the highest maximum time needed to crack Password A using Computer II? Explain your answer.
d. Which computer is more likely to crack password B? Explain your answer.
Stuck with a lot of homework assignments and feeling stressed ? Take professional academic assistance & Get 100% Plagiarism free papers
Hire the information security assignment writers to complete your C235: IT security Assignment. we have highly experienced and skilled academic assignment experts who have more than 10 years of experience in providing quality help on IT Assignments. Our experts work 24*7 to offer you 100% plagiarism free solution at a cheap price.
Looking for Plagiarism free Answers for your college/ university Assignments.
- INDIVIDUAL RESEARCH PROJECT: MERGERS AND THEIR IMPACT
- PSS388 End of Course Assessment January Semester 2025 SUSS : Integrated Public Safety And Security Management
- PSY205 Tutor-Marked Assignment 02 SUSS January 2025 : Social Psychology
- Math255 S1 Assignment-2025 SUSS : Mathematics for Computing
- BUS100 Tutor-Marked Assignment January 2025 SUSS : Business Skills And Management
- CSCXXX SUSS : New System Development Using Java : Soft Dev Pte Ltd Project
- Cloud Computing: Fundamentals, Networking, and Advanced Concepts
- COS364 Tutor-Marked Assignment January 2025 Sem SUSS : Interventions for At-Risk Youth
- FMT309 Tutor-Marked Assignment 01 SUSS January 2025 : Building Diagnostics
- HBC203 Tutor-Marked Assignment 01 January 2025 SUSS : Statistics and Data Analysis for the Social and Behavioural Sciences