100% Original, Plagiarism Free, Tailored to your instructions

Order Now!

information security analyst

Imagine that you have recently joined a University as a central information security analyst. On a busy Wednesday morning, your supervisor tells you that a significant vulnerability has been discovered in the University’s cryptosystem. Since this is a serious matter, he wants you to do some research and come up with a list of things that the University should do to handle the situation. When you inquire about the vulnerability, he points to the following URLs:
•    http://www.microsoft.com/technet/security/advisory/961509.mspx
•    http://www.win.tue.nl/hashclash/rogue-ca/
•    http://www.kb.cert.org/vuls/id/836068
•    http://www.cisco.com/en/US/products/products_security_response09186a0080a5d24a.html
You are a bit unsure about how your University uses the cryptosystem, so he explains that the University uses Message-Digest algorithm 5 (MD5) in a wide variety of areas. These include hashing to check for file integrity of downloaded files, as well as MD5 hashes that the University provides for its own files that it makes available for download, MD5 based-signing certificates from the University’s internal Certificate Authority. In addition, the University uses a Cisco ASA firewall device which can create and sign digital certificates for users and systems. These ASAs use MD5 by default, and the University has used the ASAs to create certificates for critical systems in some departments.
With these considerations in mind, you are required to submit a report on the threat the University faces and what response it would require from your institution. Briefly explain what the University should do about the vulnerability, and what effect any changes required might have on the institution or its students, employees, graduates, or other populations. The summary should include what the vulnerability is, how dangerous it could be, what are its effects and how it can be countered or remediated. You should address communication of the issue, such as who would need to be made aware of it and how. Therefore, while writing the summary, consider answering the following questions:
•    What effect does the vulnerability have on the cryptosystem?
•    Is the threat significant? What would an exploit of the cryptosystem mean to your organization?
•    How easy is it to exploit the vulnerability?
•    Does a tool exist to exploit the vulnerability?
•    Is the cryptosystem still usable but with caveats, or should it be replaced?
•    Can your organization easily replace the cryptosystem?
•    Has an exploit been released?

Our Service Charter

  1. Excellent Quality / 100% Plagiarism-Free

    We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
  2. Free Revisions

    We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
  3. Confidentiality / 100% No Disclosure

    We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
  4. Money Back Guarantee

    If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
  5. 24/7 Customer Support

    We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.

Excellent Quality
Zero Plagiarism
Expert Writers

Instant Quote

Single spaced
approx 275 words per page
Urgency (Less urgent, less costly):
Total Cost: NaN

Get 10% Off on your 1st order!