ICT 318 Network Security Tutor-Marked Assignment July Semester 2025 Presentation

TUTOR-MARKED ASSIGNMENT (TMA)

This assignment is worth 18% of the final mark for ICT 318 – Network Security.

The cut-off date for this assignment is Friday, 10 October 2025, 2355 hours.

Note to Students:

You are to include the following particulars in your submission: Course Code, Title of the TMA, SUSS PI No., Your Name, and Submission Date.

Question 1 (25 marks)

(a) Appraise and comment on the following statement:

(i) “It is important and essential to have collision resistance property (both weak collision resistance and strong collision resistance) in a secure hash function”.

(6 marks)

(ii) “Either AH (Authentication Header) or ESP (Encapsulating Security Payload) protocol, but not both, can be selected or enabled in a single Security Association (SA). However, a particular traffic flow can be protected by both AH and ESP”.

(6 marks)

(b) Assess and analyse the email header of an email, using Gmail, Yahoo mail, or otherwise, based on Activity 5 of Study Unit 3, Chapter2.

(i) Provide the steps of how the email header may be read from the chosen email service.

(2 marks)

(ii) List and explain two (2) MIME headers of your email.

(4 marks)

(iii) In the header, you will notice the word – ‘ARC’ and ‘DKIM’. Appraise the purpose of ARC and DKIM. List and explain both the ARC headers as well as the DKIM header.

(7 marks)

You must submit a snapshot of your analysis (i.e. contents of your email header).

Write My Assignment

Hire a Professional Essay & Assignment Writer for completing your Academic Assessments

Native Singapore Writers Team

  • 100% Plagiarism-Free Essay
  • Highest Satisfaction Rate
  • Free Revision
  • On-Time Delivery

Question 2 (25 marks)

(a) (i)   Apply columnar transposition algorithm to the following ciphertext and determine its plaintext:

CGIPPURRSYAFTHNOY

Assume that the key is “ASSESS”, ignoring all spaces.

(4 marks)

(ii)  Apply Vigenère Square cipher algorithm to the plaintext obtained in part (i), using the    key, ‘CRYPTO’, describe how the resultant ciphertext can be obtained. {Note: Use the Vigenère Square table given below}

(4 marks)

(iii)  What is the possible weakness of using Vigenère Square method of encryption?

(2 marks)

(b) Examine the following message packet.

Sequence Number Timestamp Actual Data Checksum

(i) Appraise how one can be reasonably sure that the message is authentic, if the message is encrypted.

(4 marks)

(ii) Assess whether it would be sufficient to just encrypt the actual data field or the entire message needs to be encrypted and why?

(3 marks)

(c) Appraise how security can be provided using symmetric encryption for the so-called enhanced protocol of the Kerberos authentication service.

(8 marks)

Question 3 (25 marks)

(a) Go to the following website: https://www.cloudshark.org/captures/a9718e5fdb28 to access the TLS test pcap file (starting from Line 1). Analyse the TLS_test pcap file and determine the following:

(i) What is the purpose of the Client_Hello message?

(2 marks)

(ii) What is the chosen Cipher Suite and explain how did the server obtained the Cipher Suite?

(2 marks)

(iii) In SSL/TLS, a session key will normally be created to enable it to perform encryption. Briefly discuss how this key is determined.

(4 marks)

(iv) In Line 5, what is the alert number given for the message “Encrypted Alert Message” and explain what does it mean?

(3 marks)

(b) (i) Go into any browser and open any web-based (X.509 Version 3) public certificate. Illustrate by using your chosen certificate and determine the following items:

  • the purpose of the certificate and the issuer.
  • the public key, the signature algorithm and the issuer’s signature.
  • the URL where the CRL list can be found and highlight one of the CRLs

(Provide a screenshot of all these items as part of your illustration)

(6 marks)

(ii)  Discuss how verification can be done to determine if the public certificate is genuine and came from the correct source. Illustrate your answer by using an appropriate diagram.

(8 marks)

Question 4 (25 mark)

(a) An intrusion detection system (IDS) is an application that monitors network traffic and searches for known threats and suspicious or malicious activities.

(i) Appraise the difference between threshold detection and profile-based detection used in statistical anomaly detection.

(4 marks)

(ii) A private education centre recently installed a computer network system to be used mainly by its employees. These employees have been with the company for many years and are expected to remain until retirement and possibly even longer. The centre has also recruited a new network administrator who has just graduated from university.

  • Appraise if the centre has any chance of implementing an effective intrusion detection system and explain why?
  • If so, which detection system would you recommend for the centre? Explain your answer.

(7 marks)

(b) A management consultancy firm, headquartered in Singapore with a branch in Sydney, requires a secure network connection between the two sites. This connection will operate over the public internet and must guarantee the confidentiality of all data in transit—including the source and destination IP addresses. All internet-bound traffic is routed through designated network gateways.

Since both the headquarters and Sydney branch host servers containing sensitive data, encryption keys must be stored exclusively on those individual servers. Although authentication is not a primary concern for the organization, your CISO has tasked you to explore implementing IPsec to ensure secure communication between the two locations.

Apply IPSEC and recommend appropriate IPSEC configurations for the firm to provide the necessary secured communication. Justify and discuss why you have made these recommendations.

(8 mark)

(c) Discuss what security services are specified by the IEEE 802.11i RSN standard. Illustrate, in your answer, the appropriate security protocols supporting these services.

(6 marks)

—- END OF ASSIGNMENT

Buy Custom Answer of This Assessment & Raise Your GradesGet A Free Quote

The post ICT 318 Network Security Tutor-Marked Assignment July Semester 2025 Presentation appeared first on Singapore Assignment Help.

Read more

ACC7032 Managerial Finance Individual Coursework Main Assessment Brief (T1) 2025/26 | BCU ACC7032 Main Assessment Brief

ACC7032 Managerial Finance Individual Coursework Main Assessment Brief (T1) 2025/26 | BCU ACC7032 Main Assessment Brief (T1) Module Title:  Managerial Finance Module Code:  ACC7032  Assessment Type Individual Coursework Level  7 Weighting   100% Word Count  2800 words  Module Leader  Amerdeep Jakhu Time Limit (for in person or oral assessments)  N/A

By Jamez Blake

Task: UMOCQW-15-M People and Orgnisations Assessment Brief 2025/26 | UWE Bristol UMOCQW-15-M Assessment Brief Submission

UMOCQW-15-M People and Orgnisations Assessment Brief 2025/26 | UWE Bristol UMOCQW-15-M Assessment Brief Submission details Module title: People and Orgnisations Module code: UMOCQW-15-M Submission deadline: Before 14:00 on 5th January 2026 Assessment title: An Individual, Written, Critical Analysis of a case study based on three topics from this module.

By Jamez Blake

BUS7076 The Integrated Business (Main) Assessment Brief: Individual Report and Group Presentation

BUS7076 The Integrated Business (Main) Assessment Brief: Individual Report and Group Presentation BIRMINGHAM CITY BUSINESS SCHOOL Graduate School of Management COURSEWORK FRONTSHEET MODULE TITLE: The Integrated Business (Main) MODULE CODE: BUS7076 ISSUE DATE: September 2025 GROUP PRESENTATION (In person): January 19th, 2026 GROUP PRESENTATION Submission on Moodle: January 20th at

By Jamez Blake

Your idea or innovation opportunity identified (Market Research sources and Industry Evaluation) Your reflection on the skills and attributes required to deliver this opportunity through research evidence

BSS079-3 Innovation and Entrepreneurship Presentation Assessment 001 Brief 2025/26 Word Count10 MinutesAcademic Year2025/26 Key Details: Module Code: BSS079-3Module Name: Innovation and EntrepreneurshipAssessment No. and Title: 001 Business Plan PresentationSubmission date: 12/01/2026 Assignment Brief What am I required to do in this assignment? What You Need to

By Jamez Blake
✍️ Get Writing Help
WhatsApp