Consider the requirements for information security of operations and personal in
ID: 3907203 • Letter: C
Question
Consider the requirements for information security of operations and personal information during the relief activities in response to the Chilean earthquake. It is possible that unfriendly foreign agents may target relief workers and attempt to intercept and compromise their personal information, the Agency's instructions to them and possibly undertake cybercrime attacks against financial and banking transactions. a) List and describe the common cryptography tools and techniques used to protect network traffic at different layers of the ISO stack, describe their weaknesses and what mitigation is available [10 marks] b) Consider the scenario where Relief Agency workers are in Chile responding to the earthquake aftermath. There is no Relief Agency network available but there is public WiFi and some LTE phone connectivity. Describe the most secure method for connecting your mobile device to the home network in Australia, listing the cryptographic tools you could use and how you would use them [10 marks]Explanation / Answer
It is possible that unfriendly foreign agents might target and intercept the network, and all this could lead to compromise in their personal information.
a) The common cryptography tools and techniques used to protect network traffic can be:
b) To connect to a network in Australia, first the most secure method is to connect through LAN Cable, but as it is not a viable option, the second-best option using the given scenario, first we can create a VPN connection to the public Wi-Fi so that the data is transferred through a secure channel, and the data being transferred will be encrypted using different Cryptographic Algorithms.
Now, the security also depends on the protocol being used during the connection and it must be secure and reliable, some of the protocols currently being used are WPA and WEP. but these protocols are no longer considered secure and the most secure protocols which can be considered is WPA2 + AES.
This is all for the question.
Thank You for using Chegg.!