INTE2625-无代写
时间:2023-05-16
RMIT Classification: Trusted
School of Computing Technologies / STEM College

INTE2625 Introduction to Cyber Security
Assessment 1: Industry-focused security report and reflection

Due date: Friday, 19th May 2023 23:59 (Melbourne time)
Weighting: 40%
Word limit: Report: 10–15 pages (+/-10%); Reflection: 400 words (+/-10%)
Assessment type: Report / Reflection
Group or individual assessment: Individual

Overview
During this course, you’ve learned about two types of encryptions (AES and RSA) that provide
confidentiality and how to create and/or verify digital signatures. In this assessment, you’ll use the
GPG package and Kali Linux to work through three sets of tasks in the following areas: symmetric
encryption, public key encryption and digital signatures. You’ll follow the detailed instructions and
document your work in a report. After completing the report, you’ll write a short reflection to
demonstrate your understanding of the concepts and value proposition of these concepts to real-
world applications.
Purpose
Ensuring the confidentiality of information is vital to business communications for many reasons,
including competitive advantage, privacy, remote user authentications and data integrity. In this
environment, encryption skills are an important asset. In this assessment, you’ll demonstrate your
ability to use encryption algorithms to generate keys, safeguard files, distribute encryption keys
securely and create digital signatures using these tools.
What do you need to deliver?
• 1 x Report (10–15 pages with screenshots)
• 1 x Reflection (400 words)
Page 2 of 8
RMIT Classification: Trusted
Tools
• Kali Linux
• Lab manual
Course learning outcomes
This assessment is linked to the following course learning outcomes:
CLO 1 Describe cyber security hygiene concepts for risk-based cyber assurance.
CLO 2 Explain cryptography and security protocols and their roles in securing data communication
and authenticating users.
Marking criteria
This assessment will measure your ability to:
Part 1: Report (30 points)
• Respond to prompts and complete tasks accurately (13 points)
• Describe details of task execution clearly (12 points)
• Explain key functions in data encryption (5 points)
Part 2: Reflection (10 points)
• Demonstrate understanding of cyber security hygiene concepts (5 points)
• Communicate ideas clearly and reference appropriately (5 points)
Page 3 of 8
RMIT Classification: Trusted
Assessment details
To complete this assessment, you’ll need to use Kali Linux (refer to Week 1 for more information if
required). Each step in Part 1 must be included in your report, along with screenshots documenting
your work and the results.
Part 1: Report
Divide the report into three sections:
Symmetric encryption
1. Encrypt a file of your choosing (text or binary) using the AES algorithm.
2. Decrypt the encrypted file.
3. Explain the following: If you encrypt a file using symmetric encryption and want someone
else to decrypt it, how could you safely share the passphrase?
Public key encryption
1. Generate keys of three different sizes (800, 2048, 4096) (for RSA encryption scheme and
include these keys in the report.
2. Check the key files and estimate the number of decimal digits of the keys and write your
estimates.
3. Encrypt your file (used in section one) using three keys and record your results and note the
observation.
4. Explain why GPG encryption and decryption are quite fast.
5. Create a new file of close to 1 GB and encrypt and decrypt it and note the time taken.
Comment on the reason why this much time has been taken. Calculate how long it would
take to do the encryption/decryption of a data file of 10 GB.
6. Export your public key and discuss the reason why your exported key should be in ASCII
format.
7. Encrypt a new file and output the cipher text in ASCII format. Explain when you need cipher
text in ASCII format.
NOTE: You’ll need a second account to complete the remaining tasks in this section.
8. Create a second account and name this account “Alice”.
9. Email your public key to Alice.
10. As Alice, import your public key into a key ring.
11. As Alice, encrypt your file (used in section one) using the public key and send it back to your
original account.
12. Decrypt the encrypted file.
Digital signatures
1. Sign a file using your private key.
2. Send the public key to Alice.
3. As Alice, verify the signed file.
Page 4 of 8
RMIT Classification: Trusted
Part 2: Reflection
• After completing the tasks in Part 1, reflect on your use of encryption and the role of
cryptography by carrying out the following:
o Compare the difference between symmetric encryption, public key encryption and
signing based on the experiments.
o Discuss the role of cryptography in securing the communication of confidential
documents.
Recommended length and structure
Please use headers to clearly identify Part 1 (Report) and Part 2 (Reflection). Please structure this
assessment as follows:
• Part 1: Report (10–15 pages with screenshots)
o symmetric encryption
o public key encryption
o digital signature
• Part 2: Reflection (400 words)
Required references
Part 1
Part 1 doesn’t require referencing, but you may wish to refer to websites or manuals as you work
through your tasks.
Part 2
Please cite at least two sources in Part 2. You may use your course textbook or other books,
journals, websites or news articles accessed within or outside of the course.
Referencing guidelines
Use Harvard referencing style for this assessment. If you are using secondary sources, include
these as a reference list in your report.
You must acknowledge all the sources of information you have used in your assessments.
Refer to the RMIT Easy Cite referencing tool to see examples and tips on how to reference in the
appropriate style. You can also refer to the Library referencing page for other tools such as
EndNote, referencing tutorials and referencing guides for printing.
Submission instructions
The assessment will be submitted in Canvas as an MS Word upload.
Academic integrity and plagiarism
Academic integrity is about the honest presentation of your academic work. It means acknowledging
the work of others while developing your own insights, knowledge, and ideas.
Page 5 of 8
RMIT Classification: Trusted
You should take extreme care that you have:
• acknowledged words, data, diagrams, models, frameworks and/or ideas of others you have
quoted (i.e., directly copied), summarised, paraphrased, discussed, or mentioned in your
assessment through the appropriate referencing methods
• provided a reference list and /or bibliography of the publication details so your reader can
locate the source if necessary. This includes material used from Internet sites.
If you don’t acknowledge the sources of your material, you may be accused of plagiarism because
you have passed off the work and ideas of another person without appropriate referencing, as if they
were your own.
RMIT University treats plagiarism as a very serious offence constituting misconduct.
Plagiarism covers a variety of inappropriate behaviours, including:
• failure to properly document a source
• copyright material from the internet or databases
• collusion between students.
For further information on our policies and procedures, please refer to the University website.
Assessment declaration
When you submit work electronically, you agree to the assessment declaration.
Page 6 of 8
RMIT Classification: Trusted
Part 1 (30 points)
Below is the rubric for Part 1 of this assessment showing the grading criteria and describing the levels of achievement for each of these criteria.
Criterion 1
Respond to prompts and complete tasks accurately.
Total pts: 13
HD
13 to > 10.40 pts
All tasks are completed. High
technical skill level is
demonstrated across all three
areas. Task outcomes are
highly accurate and precise.
D
10.39 to > 9.10 pts
All tasks are completed. Good
technical skill level is
demonstrated across all three
areas. Task outcomes are
mostly accurate.
C
9.09 to > 7.80 pts
Most tasks are completed.
Generally good technical skill
level is demonstrated across
all three areas, though some
areas might be less
successful. Task outcomes
are generally accurate.
P
7.79 to > 6.50 pts
All tasks are attempted
though some may be
incomplete. Some technical
skill level is demonstrated
across two or more areas,
though some areas might be
less successful. At least 60%
of task outcomes are
accurate.
N
6.49 to > 0 pts
At least 70% of the tasks are
attempted. Technical skill
level is demonstrated in at
least one area. At least 50%
of task outcomes are
accurate.
DNS
0 pts
The majority of tasks are not
completed or attempted. Little
technical skill level is evident.
Task outcomes are generally
inaccurate.
Criterion 2
Describe details of task execution clearly.
Total pts: 12
HD
12 to > 9.60 pts
Details of task execution are
described clearly, concisely
and comprehensively. Report
is clearly organised and easy
to follow. Use of headers and
screenshots is highly relevant
and supports understanding.
D
9.59 to > 8.40 pts
Details of task execution are
described clearly and
concisely. Report is clearly
organised. Use of headers
and screenshots is
appropriate and supports
understanding.

C
8.39 to > 7.20 pts
Details of task execution are
described clearly. Report is
generally logically organised.
Use of headers and
screenshots is generally
appropriate and supports
understanding.
P
7.19 to > 6.00 pts
Task execution is described
though some minor details
may be lacking. Report is
logically organised, though
may be unclear in some
areas. Some use of headers
and screenshots is present,
though this could be used
more consistent or logically.
N
5.99 to > 0 pts
Task execution is described
though some key details may
be lacking. May be unclear or
difficult to follow. Ineffective
use of headers and
screenshots at times.
DNS
0 pts
Ineffective or no description of
task execution.
Page 7 of 8
RMIT Classification: Trusted
Criterion 3
Explain key functions in data encryption.
Total pts: 5
HD
5.00 to > 4.00 pts
Descriptions of key data
encryption functions are clear,
concise and comprehensive.
Answers demonstrate insight
into data encryption.
D
3.99 to > 3.50 pts
Descriptions of key data
encryption functions are clear
and concise. Answers
demonstrate good
understanding of the functions
of data encryption.
C
3.49 to > 3.00 pts
Descriptions of key data
encryption functions are clear.
Answers demonstrate a basic
understanding of the functions
of data encryption.
P
2.99 to > 2.50 pts
Descriptions of key data
encryption functions are
present, though some details
may be lacking. Answers
demonstrate some
understanding of the functions
of data encryption.
N
2.49 to > 0 pts
Descriptions of some data
encryption functions are
present, though not always
clear or relevant.
Answers demonstrate some
basic understanding of the
functions of data encryption.
DNS
0 pts
Descriptions of data
encryption functions are
missing or not accurate or
relevant.
Part 2 (10 points)
Below is the rubric for part 2 of this assessment showing the grading criteria and describing the levels of achievement for each of these criteria.
Criterion 1
Demonstrate understanding of key ideas in cyber security.
Total pts: 5
HD
5.00 to > 4.00 pts
Reflection demonstrates a
clear understanding of cyber
security hygiene concepts.
Comments are highly relevant
and demonstrate insight into
data encryption and the role
of cryptography.
D
3.99 to > 3.50 pts
Reflection demonstrates a
clear understanding of cyber
security hygiene concepts.
Comments are relevant and
demonstrate knowledge of
data encryption and the role
of cryptography.
C
3.49 to > 3.00 pts
Reflection demonstrates an
understanding of cyber
security hygiene concepts.
Comments are generally
relevant and demonstrate
general knowledge of data
encryption and the role of
cryptography.
P
2.99 to > 2.50 pts
Reflection demonstrates
some understanding of cyber
security hygiene concepts,
though some points may be
missing. Comments
demonstrate some knowledge
of data encryption and the
role of cryptography.
N
2.49 to > 0 pts
Reflection demonstrates
some basic understanding of
cyber security hygiene
concepts, though some key
points may be missing.
Comments demonstrate some
basic knowledge of data
encryption and the role of
cryptography.
DNS
0 pts
Reflection demonstrates little
or no basic knowledge in
cryptography or data
encryption.
Criterion 2
Communicate ideas clearly and reference appropriately.
Total pts: 5
Page 8 of 8
RMIT Classification: Trusted
HD
5.00 to > 4.00 pts
Consistently communicates
meaning effectively through
clear, unambiguous language
and appropriate tone.
Consistently uses
appropriate, accurately
positioned references; all in-
text citations, references and
formatting are fully to Harvard
style.
D
3.99 to > 3.50 pts
Communicates meaning
effectively through mostly
clear, accurate language and
appropriate tone.
Uses mostly appropriate,
accurately positioned and
formatted references; in-text
citations, references and
formatting are to Harvard
style.
C
3.49 to > 3.00 pts
Generally communicates
clearly, though some
instances of incorrect
language use or tone may be
evident. However, they do not
obstruct meaning.
Uses generally appropriate
references, accurately
positioned; most in-text
citations, referencing and
formatting are to Harvard
style
P
2.99 to > 2.50 pts
Generally communicates
clearly, though some
instances of incorrect
language use may obstruct
meaning at times; tone may
be inappropriate.
References generally
accurately positioned to
Harvard style, though minor
omissions may be present.
N
2.49 to > 0 pts
Communicates, though
instances of incorrect
language use obstruct
meaning; tone may be largely
inappropriate.
References positioned
incorrectly or used
inappropriately; major
omissions in in-text citations
and references not in Harvard
style.
DNS
0 pts
Language fails to
communicate any real
meaning.
Failure to provide evidence of
research or referencing.
essay、essay代写