0% found this document useful (0 votes)
20 views

ACC Breakdown

Uploaded by

sayuruimesh479
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

ACC Breakdown

Uploaded by

sayuruimesh479
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ShipCargo is a freight forwarding company which uses an on-prem ERP

system and a database. However, the management decided to move to the


cloud for better availability, resiliency and to minimize the complexities and
cost of management. You have been appointed by the management to do a
technical report with the following tasks to support them so thar a better
and informed decision can be taken.

Task 1

Compare and critically analyse the fundamental differences, advantages and


drawbacks between stream cipher and block cipher. Simple examples can be
used in explanations. Discuss the improvements that can be introduced to
ShipCargo cloud by stream cipher. Justify your answer.

Ciphers like DES and AES use bitwise XOR operations in their algorithm.
Implement an algorithm to show how a 4-bit input can be encrypted with a 4-
bit key using XOR function. Provide screenshots of the code.

Introduction

Explain what is a freight forwarding company and their operation generally


using one paragraph.

Explain the advantages of moving such system to the cloud and


cryptography can be used in order to ensure the security. (suing 1 -2
paragraphs )

Task 1

1.1 explain what symmetric key encryption is using proper illustrations.


1.2 Explain what stream cipher and block ciphers with valid examples and
diagrams.
1.3 Explain how stream cipher and block ciphers can be used at ShipCargo,
when it comes to block and stream ciphers with different use cases.
1.4 Implement an algorithm to show how a 4-bit input can be encrypted
with a 4-bit key using XOR function using a programming language such
as python.
Task 2

2.1 briefly compare symmetric key encryption and asymmetric encryption by


highlighting strengths and weaknesses of both with proper illustrations.

2.2 Explain the limitation of symmetric key encryption with relevant given
scenario. (you have to discuss the security vulnerabilities of encrypting with
a single key)

2.3 Explain how asymmetric key encryption can solve the above-mentioned
vulnerabilities. And discuss how hybrid cryptosystems can be used at Ship
cargo. ( when writing your answer please include what is Key Encapsulation
Mechanisms (KEMs), Data Encryption Mechanisms (DEMs), and Public Key
Encryption (PKE). )

Task 3

3.1 Briefly explain what is meant by PKI, and compare the difference and
limitations between private cloud PKI and on-premise PKI.

3.2 Identify security risks and challenges likely to occur when using a cloud-
hosted PKI.

3.3 Take a business scenario from Ship cargo environment and illustrate
how PKI can be used there (with diagrams).

3.4 By analysing Ship cargo environment, design a security case and


suggest suitable cryptography and cryptoanalysis tools which can be
used to overcome the security concerned mentioned above.

Task 4

4.1 Explain what hybrid cryptosystem is and how can it be utilized to


improve cloud security. And justify how it will help to protect
organizations data.
4.2 Explain how cryptography can be used to achieve different
business objectives, with different applications. (explain how
encryption hashing, digital signatures, asymmetric key encryption can
be used for business scenario).
4.3 Identify and discuss what are the common factors that may influence
organization’s choice of cloud systems in order to improve security (you
need to discuss and do a comparison of advantages and disadvantages of
on premises storage and cloud storage).

You might also like