The School of Computing and Mathematical Sciences (CMS) at the University of Greenwich (UoG) has decided to
Question:
The School of Computing and Mathematical Sciences (CMS) at the University of Greenwich (UoG) has decided to set up a locally-hosted website for cybersecurity assessment of computing devices such as computers and smart phones within UoG. The school believes the website can be used to enhance the security of data sharing among the devices. Users of the website will be encouraged to use the website and provide feedback on any gaps or enhancements.
A trial run of the above website was undertaken with lecturers and students all of whom were polled for their feedback regarding 'any gaps or enhancements'. It became clear that such users were mostly concerned about confidentiality and integrity issues in communications between lecturers with lecturers and lecturers with students. Many suggested the use of encryption, hashing and steganography as possible useful technologies. The management therefore decided to seek your help, as a current MSc student, in answering SOME questions about these technologies.
Perform the following tasks based on the background.
- Draw a detailed network diagram of the School of CMS to show the data exchange between computing devices and the website. In this case, the computing devices are accessing the website.
- Manually assign an IP address and a MAC address to every item (such as the computing devices) on the network to support secure data sharing in the network.
- Using the network diagram, show the traces of secure data sharing in the network and explain considerations for assigning such IP addresses
- Using any wide-accepted network packet analyser tool (e.g., Wireshark), explain two threats to the security of data sharing between two computing devices in the network and briefly state how these threats could be mitigated.
Operations and Supply Chain Management
ISBN: 978-1118738542
8th edition
Authors: Roberta S. Russell, Bernard W. Taylor