Question: **Question 1 has been solved, PLEASE SOLVE Q2** You have been exposed to a number of basic concepts in the first two modules. The first
**Question 1 has been solved, PLEASE SOLVE Q2**
You have been exposed to a number of basic concepts in the first two modules. The first module was used to set the stage by explaining the basic principles of security and how we are all already very familiar with them. The advent of the computer makes us focus on Data, but data security is in fact very similar to personal security. We want similar things.
We then proceeded to discuss threat modeling as a way to systematically analyze threats, vulnerabilities and attack paths. This allowed us to make informed decisions about what kind of mitigation strategies we want to take.
This then led us to talk about cryptography. In this first module, we talked about some of the basis of cryptography basically saying that they are a set of Plaintexts, Ciphertexts, Encryption Functions, Decryption Functions, as well as Encryption Keys and Decryption keys.
-
(2 points) Write an implementation of the Caeser Cipher in Python and include as a .py attachment
-
It should take command line arguments to --encrypt or --decrypt (use argparse). Include help text for the commands.
-
I will run the following commands to evaluate it:
-
python caeser.py --encrypt somestring
-
python caeser.py --decrypt somestring
-
-
Your script should simply output the encrypted or decrypted string.
-
-
(6 points) Write a script that will copy a file from one directory to another, and demonstrate a practical example of using a hash.
-
Part 1: Write a script to copy a file from one directory to another. Use a SHA256 hash to confirm that the file copied cleanly into it's new location.
-
Part 2: Expand your script with a command line argument that will scramble a single byte in the copied file. Demonstrate that the hashes are of the two files are now different.
-
Some detailed requirements:
-
Please use the attached zip file as the base starting point for the file structure and outline.
-
Use argparse for argument parsing. Your argument should be named -scramble.
-
Comment your code for full credit
-
Your code should have help text and I should be able to understand it easily.
-
Your code should work with native Python 3 libraries
-
Do not change the file name when copying it.
-
Please answer the question in the question.txt text file. (1 point)
-
-
Please submit a zip file with your response containing two scripts, clearly labeled. Please include command line help for how the script should be used and comment your code.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
