1. Combating Typo Squatting
What can organizations do to fight back against typosquatting? Research the Internet to find out how companies are combating this growing problem. How can these typosquatting sites be taken down? What must a company do in order to stop these sites? And why has it been so difficult to do this? What proactive steps can a company take? Write a short report on your research. [4 marks]
2. Zero-Day Attacks
Attacks that exploit previously unknown vulnerabilities are considered some of the most dangerous attacks. Use the Internet to research these attacks. How are the vulnerabilities discovered? What are some of the most recent zero-day attacks? What defenses are there against them? Write a short report on your research. [4 marks]
3. Diffie-Hellman Research
How does Diffie-Hellman key exchange protocol work? Use the Internet to research this key-exchange protocol. Then visit the website dkerr.home.mindspring.com/diffie hellman calc.html to see how values are created. Provide a numerical example and show how the ‘man-in-the-middle’ attack works in this protocol. write a short report on your research. [4 marks]
4. Cryptanalysis of Polyalphabetic Ciphers:
In this question, you learn a classical polyalphabetic substitution cipher (known asVigen´ere cipher) and are required to cryptanalysis given cryptogram. Cryptanalysis of an information system is the study of mathematical techniques for attempting to defeat information security services. A cryptographic system is said to be breakable if a third party (i.e., cryptanalyst), without prior knowledge of the key, can systematically recover plaintext from the corresponding ciphertext within an appropriate time frame.