• July 24th, 2015

CSEC 610 Final Exam Paper

Paper, Order, or Assignment Requirements

 

  1. Read the article from the following link (http://polaris.umuc.edu/csec/csec610/exam_resources15.html) and answer the following questions.

 

 

  1. Research a threat modeling tool that you consider is best to model threatsto information systems. Provide a diagram of the modelingtool similar to Figure 1 in the article. (1 page)

 

  1. Rewrite the section 3.1 “Threat Modeling” (with no less than 275 words) in your own words according to the modeling tool you’ve just discovered. (1 full page)

 

  1. Research a risk assessment tool that you consider is best to assess risks of information  systems. Provide an example of the interface similar to Figure 2 in the article. (1 page )

 

  1. Rewrite the section 3.2 “Risk Assessment” (with no less than 275 words) in your own words according to the risk analysis tool you’ve just discovered. (1 page)

 

  1. Add a section 3.5on Cyber “Advanced Persistent Threat – APT”(with no less than 275 words) and discuss its tactics, techniques and procedures. (1 page)

 

 

  1. Apple’s new iPhone data encryption that makes NSA and law enforcement agencies worry about whether they can still break into phones during investigation even with a court order. ( See Link: http://polaris.umuc.edu/csec/csec610/exam_resources15.html)

 

The new phone encrypts emails, photos and contacts based on a complex mathematical algorithm that uses a code created by, and  unique to, the phone’s user. Breaking the  code, could take more than 5 1/2 years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers. [Excerpt]

 

David E. Sanger and Brian X. Chen. (Sep. 26, 2014) Signaling Post-Snowden Era, New iPhone Locks Out N.S.A. The NY Times. Retrieved from http://nyti.ms/YmQz0l (The article is attached.)

 

  1. Read the full article, do researchon the subject and discuss the technologies behind the new iPhone encryption. (1 page)

 

  1. State and fully  discuss your opinion (support or against) about the adoption ofthe iPhone encryption. (1 page)

 

  1. Following Apple, Google will have its Android operating system with encryption by default. But as we know Google can still collect your data from Gmail. So do other free email services like Yahoo and Hotmail.

 

Suppose you have a full-time job in cybersecurity. If there is an email service charging $40 a year but does not collect your data. Are you willing to switch to this email service or would yourather stay in the current free email services by scarifying your privacy?(1 page)

 

  1. This question is hidden/encrypted in the attached picture named img.jpg. You need to decrypt this picture to get the question (in text.txt file). (1 full page)

Hint: To decrypt the picture, you may access the virtual lab and access the folder. This time, you need to save the picture, copy this image file (img.jpg) to the c:encrypt folder to replacethe original file already there on the virtual machine. Run the encrypt.exe you will see a text file comes out. The newly generated/decrypted text file is the question. 

 

Latest completed orders:

Completed Orders
# Title Academic Level Subject Area # of Pages Paper Urgency