ICTNWK502 Implement Secure Encryption Technologies Assignment-Western Sydney college Australia.

Subject Code&Title: ICTNWK502 Implement Secure Encryption Technologies
Information for Student: All work is to be entirely of the student.
General Information for this assessment:
 Read the instructions for each question very carefully.
 Be sure to PRINT your FIRST name & LAST name in every place that is provided.
 Short questions must be answered in the spaces provided.
 For those activities requesting extra evidence such as: research reports, essay reports, etc. The student must attach its own work formatted in double space, Arial 12 pts.
 All activities must be addressed correctly in order to obtain a competence for the unit of competency.
 If the student doesn’t understand the assessment, they can request help from the assessor to interpret the assessment.
 Re-submission of assessment after the term will incur additional fees.
ICTNWK502 Implement Secure Encryption Technologies Assignment-Western Sydney college Australia.

ICTNWK502 Implement Secure Encryption Technologies Assignment-Western Sydney college Australia.

Re-assessment of Result & Academic Appeal procedures:
a student is not happy with his/ her results, that student may appeal against their grade via a written letter, clearly stating the grounds of appeal to the Chief Executive Officer. This should be submitted after completion of the subject and within fourteen days of commencement of the new term.

Re-assessment Process:
 An appeal in writing is made to the Director of Studies (DOS) providing reasons for re-assessment /appeal.
 DOS will delegate another faculty member to review the assessment.
 The student will be advised of the review result done by another assessor.
 If the student is still not satisfied and further challenges the decision, then a review panel is formed comprising the lecturer/trainer in charge and the DOS OR if need be an external assessor.
 The Institute will advise the student within 14 days from the submission date of the appeal. The decision of the panel will be deemed to be final.
 If the student is still not satisfied with the result, the he / she has the right to seek independent advice or follow external mediation option with nominated mediation agency.
 Any student who fails a compulsory subject or appeals unsuccessfully will be required to re-enrol in that subject.

ICTNWK502 Implement Secure Encryption Technologies Assignment-Western Sydney college Australia.

ICTNWK502 Implement Secure Encryption Technologies Assignment-Western Sydney college Australia.

Assessment Task 1
1.Explain certificate related infrastructure (certificate authorities, registration authorities, repository services).

2. Summarise common asymmetric key algorithms and their usage.

3.Explain common symmetric key algorithms and their usage, such as:
a) advanced encryption standard (AES)
b) data encryption standard (DES)
c) triple data encryption algorithm (triple DES)
d) Blow fish

4.Explain encryption strength.

5. Summarise various encryption types, including public key, secret key, hash key.

ICTNWK502 Implement Secure Encryption Technologies Assignment-Western Sydney college Australia.

ICTNWK502 Implement Secure Encryption Technologies Assignment-Western Sydney college Australia.

6. Summarise the functions and features of:
a) access control permissions
b) digital signatures
c) symmetric encryption, asymmetric encryption and one-way encryption
d) timestamps

7.Explain one-way message digests, such as message digest algorithm 5 (MD5) and secure hash algorithm (SHA).

8.Explain public key infrastructure (PKI), pretty good privacy (PGP) and GNU Privacy Guard (GnuPG).

9.Outline replay security.

10.Outline possible sources of security threats, including eavesdropping, data interception,data corruption, data falsification and authentication issues.

11.Explain transmission control protocol or internet protocol (TCP/IP) protocols and applications.

12. Summarise security problems and challenges that arise from organisational issues.

13.Outline wired equivalent privacy (WEP), Wi-Fi protected access (WPA) and Wi-Fi protected access 2 (WPA2).

ORDER Now This ICTNWK502 Implement Secure Encryption Technologies Assignment And Get Instant Discount

Order Your Assignment