Free Essay

Itt Lab 7 Lab Doc

In:

Submitted By jschen2016
Words 285
Pages 2
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION

Lab #7 - Assessment Worksheet
Using Encryption to Enhance Confidentiality and Integrity
Course Name and Number: _____________________________________________________ john schenberger
Student Name: ________________________________________________________________

Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
In this lab, you learned how cryptography tools can be used to ensure message and file transfer integrity and how encryption can be used to maximize confidentiality. You used Kleopatra, the certificate management component of GPG4Win, to generate both a public and private key as both a sender and a receiver. You used the sender’s keys to encrypt a file, sent it to the receiver, and decrypted it using the receiver’s copy of the keys.
Lab Assessment Questions & Answers
1. If you and another person want to encrypt messages, should you provide that person with your public key, private key, or both?
The public key is the only key that I will share with another person as part of the handshake in order of the encryption take place.

2. What does Kleopatra allow you to do once it is installed?
Kleopatra allow you to encrypted messages, files and text with a private key.

3. What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possible?
Kleopatra uses both RSA (Rivest, Shamir, and Adelman encryption algorithm) and DSA (Digital Signature
Algorithm) for encryption.

4. What was the fingerprint generated with your Kleopatra certificate?
4F094A33E0E84C2599B227053BA70731C6D1B1FC

5. If someone sends you his public key and you import it into Kleopatra, will he be able to decrypt the encrypted messages you send him?
No, because I would still ha(e to pro(ide my public )ey to the user who wants to decrypt my message

Similar Documents

Free Essay

It Computer

...Windows Security Features. Chapter 1; Chapter 2. 2, Secure Access Control. Chapter 3. Lab 1; Assignment 1. 3, Windows Encryption. Chapter 4. IS 3340 - Windows Security - ITT Tech Flint Study Resources www.coursehero.com/sitemap/schools/1177-ITT.../1724144-IS3340/ Looking for help with IS 3340 at ITT Tech Flint? Course ... IS 3340 - Windows Security - ITT Tech Flint Study Resources ...... Quality answers or your money back. IS3340 Lab Unit 5 Assignment 1 : WINDOWS SE IS3340 ... www.coursehero.com/file/8721414/IS3340-Lab-Unit-5-Assignment-1/ Jan 26, 2014 - MOST POPULAR MATERIALS FROM WINDOWS SE IS3340. 1 Page ... IS3340 Lab Unit 5 Security Assessment Potential Risk ... Access Security > Ali > Notes > IS4670_15_Syllabus.pdf ... www.studyblue.com/notes/note/n/is4670_15_syllabuspdf/.../9759518 Feb 7, 2014 - Find and study online flashcards from Access Security. ... IS3350 Security Issues in Legal Context IS3230 Access Security IS3340 Windows Security IS3440 .... Don?t assume there is only one correct answer to a question ? You've visited this page 2 times. Last visit: 5/28/14 [DOC] Assignment www.webonthecloud.com/is3340/Assignments.docx This assignment builds on the scenario of Ken 7 Windows Limited, which was ... Provide the answers to the following questions to satisfy the key points of ... IS3340 Windo ws Security STUDENT COPY: Graded Assignment Requirements. [DOC] Syllabus - ITT Tech. www.webonthecloud.com/is3340/Syllabus.docx IS3340. Windows Security. Instructor...

Words: 287 - Pages: 2

Free Essay

Stuff

...cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by using the command-line interface (CLI). 5. Use the various Linux process management features. 6. Create and execute basic scripts by using the Perl programming language and Bourne Again Shell (bash). 7. Configure computer hardware in Linux. 8. Administer and maintain a Linux system. 9. Install and update software in Linux 10. Access Linux network services using...

Words: 2032 - Pages: 9

Premium Essay

Movies

...E-mail: E-mail: VShafer@itt-tech.edu Cell Phone#: 865-236-1869 Title: Analyzing Windows Application Software for Security Vulnerabilities Learning Objective ▪ Design techniques to protect given Windows application software from security vulnerabilities. Key Concepts ▪ Vulnerabilities to Microsoft server and client applications ▪ Strategies for securing Microsoft server and client applications ▪ Procedures for securing Microsoft applications Class/Content Outline: 5:00pm – 5:50pm Theory 7 (50 min.) 1. Roll / Lesson Plan / Handouts 2. Review/ Discuss Unit 8 ~ ▪ Chapter 12 “Microsoft Application Security”; pp. 271-296 3. In Class IS3340.U8.GA1 ~ Unit 8 Assignment 1: Policy for Securing Windows Environment ▪ You will select from the list of security controls that best addresses to each given ERP vulnerabilities. (*Note: You will refer to the Unit 1 case scenario IS3340.U1.TS3.doc for the Ken 7 Windows Limited details.) We will discuss the correct answers in class 6:00pm – 7:40pm Lab 1 (100 min.) 4. Lab 8 ~ Apply Security Hardening on Windows Microsoft Server & Microsoft Client Applications; pp. 68-73 8:00pm – 9:40pm Theory 7 (100 min.) & 9:50pm – 10:45pm Theory 7 (55 min.) 5. IS3340.U8.GA2 ~ Unit 8 Assignment 2: Best Procedures to Secure Windows Applications ▪ To complete IS3340.U8.GA2.doc ~ You will write a Windows application policy and define its procedure for Ken 7 Windows Limited. You have...

Words: 630 - Pages: 3

Premium Essay

Accounting

...------------------------------------------------- Graded Assignment Requirements Assignment Requirements documents provided below must be printed and distributed to students as the guidance for completing the assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1. Lab 1. Preparing a Virtual Workstation Image Windows 7 Virtual Machine “Keyless” Installation and Re-arm Process Purpose: This section describes the reason for and the procedure to use the “keyless” installation for Windows 7 Professional applicable to our lab environment for IT109/NT1230, and to use the “Re-arm” procedure to extend the trial period to meet our curriculum needs. Background: In installing Windows 7 Professional into a virtual machine in the VMware Player for the labs in our lab environment, if the Product Key for Windows 7 Professional is applied and activated during or at the end of the installation, the installed virtual machine will be authorized to launch only from the physical computer from which it was installed, as Microsoft registers the product key to associate with the hardware identity of the physical computer in their antipiracy database during the activation process. Subsequently, if the virtual machine is launched from a different computer, Microsoft will deem this as a pirated...

Words: 5558 - Pages: 23

Premium Essay

Nt2580 Unit 1

...NT2580-M1 Introduction to Information Security Unit 1: Information Systems Security Fundamentals 2015-Summer, 6/20/2015, Saturday (9:00am – 1:30pm) Student Name ___________________________________ Lesson Plan Theory (in class, Lab #2)……………………………..…………………..……...2 Reading  Kim and Solomon, Chapter 1: Information Systems Security. Objectives……………..………………….……………………………….2 Student Assignments for this Unit Unit 1 Lab Perform Reconnaissance & Probing Using ZenMap GUI (Nmap) Lab #1: Performing Network Reconnaissance using Common Tools Overview and access vLab..............................................................................................3 Part 1: Exploring the Tools used in the Virtual Lab Environment……………16 Unit 1 Assignment Match Risks/Threats to Solutions Part 2: Connecting to a Linux Machine …………………. .........................44 Unit 1 Assignment Impact of a Data Classification Standard Part 3: Using Zenmap to Perform Basic Reconnaissance ……………………59 Appendix A. SYLLABUS………………………………………………..……..………….69 B. Forgot your password?………………………………………………..……..73 Instructor: Yingsang “Louis” HO Tel: 425-241-8080 (cell), (206) 244-3300 (school) Email: yho@itt-tech.edu NT2580_2015_Summer_M1_UNIT1.doc Page 1 of 76 Unit 1: Information Systems Security Fundamentals Learning Objective  Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts  Confidentiality, integrity, and availability...

Words: 3379 - Pages: 14

Premium Essay

Itt Syllabus

...Theory, 22 Lab) GS1145 Strategies for the Technical Professional Syllabus COURSE SUMMARY COURSE DESCRIPTION This course reviews characteristic and trends of the global information society including basic information processing, Internet research, other skills used by the technical professionals and techniques that can be used for independent technical learning. MAJOR INSTRUCTIONAL AREAS 1. Getting Started at ITT Technical Institute 2. Productivity Software 3. Overview of Technology Tools 4. Microsoft Word 5. Microsoft PowerPoint 6. Microsoft Excel 7. Microsoft Access 8. Communication Tools 9. Exploring Career Goals 21st-century skills o Changes in work and the workplace o Building marketable proficiencies o Projecting professionalism ITT Technical Institute Career Services Resources o Targeting job descriptions  o Transferable skills Crafting a Resume 10. Skills and Techniques of a Successful Student Strategies for independent learning Learning styles Note-taking strategies Test-taking techniques © ITT Educational Services, Inc. All Rights Reserved. [2] 10/29/2013 GS1145 Strategies for the Technical Professional Syllabus Critical thinking Problem solving Basic research skills o ITT Tech Virtual Library o Web searches o Citing sources Time management Working in teams COURSE LEARNING OBJECTIVES By the end of this course, you should be able to: 1. Gather relevant information using ITT Technical Institute resources, such as student email, ITT Tech Virtual...

Words: 14113 - Pages: 57

Premium Essay

Super Training

...Overview 3 Section 2: Manufacturing Information Systems 4 Section3: User Communication systems 5 Section4: Customer Relationship Management Systems 6 Section 5 Sales and Marketing Information Systems 7 Section 6: Firewalls 8 Section 7: Audio and Video Streaming 9 Section 8: Summary of Topics Not Chosen 11 Bibliography 12 Revision History 14 ABSTRACT This paper is about how SuperTraining Corporation can best utilize various IT resources to gain a competitive adavanted in the area of on-line training and eduction. Some topics sucha as e-commerce, network security and social media adaptations will be discused. Assumptions I have a few assumptions regarding SuperTraing Coporataion and they are: * Students are required to work @ home and attend classes on-site. * SuperTraining Corporation is experienced at long distance learning. * SuperTraining Corporation is an extablished, profitable business. * SuperTraining Corporation has an extablished infrastruture. Section 1: Overview | | My six topics are important to SuperTraining because SuperTraining Coporations business model revolves around customer service. They provide technical training much like the ITT Technical Intitute who trains civilians and veterans alike across the country (ITT Technical Institute, 2012). SuperTraining focus is for current technical skills learned in the class and at home and to provide internships that lead to job placement. Manufacturing Information Systems are...

Words: 3055 - Pages: 13

Free Essay

Acer

...Information Technology and Organizations TECHNOLOGY TO COMPETE Acknowledgement: This research has been supported by grants from the CISE/IRIS/CSS Division of the U.S. National Science Foundation, and the NSF Industry/University Cooperative Research Center, whose members include: ATL Products, The Boeing Company, Canon Information Systems, IBM Global Services, Nortel, Rockwell, Seagate Technology, Sun Microsystems and Systems Management Specialists (SMS). The authors would like to acknowledge the research assistance of Bryan MacQuarrie. They would also like to acknowledge the cooperation and assistance of numerous Acer Group executives and managers who agreed to be interviewed and provided vital data and information Acer_case_10-99.doc 2 Acer: An IT Company Learning to Use IT to Compete Jason Dedrick, Kenneth L. Kraemer, Tony Tsai I. INTRODUCTION Acer Computer is an unusual company in the personal computer industry. Companies such as Dell, Compaq and Gateway focus on designing, configuring, marketing and servicing PCs and increasingly leave the manufacturing to contract manufacturers and OEM producers. By contrast, Acer is a diversified, vertically integrated manufacturer of PCs, components and peripherals that it sells under its own brand name and on an OEM basis for other PC makers. Acer’s diversified product line resembles that of giants such as IBM, Hewlett-Packard, Toshiba and NEC, yet it is only a fraction of their size. Acer’s strategies and culture are the...

Words: 12392 - Pages: 50

Free Essay

An Examination of Discrimination Against Transgender Americans in the Workplace Hearing

...COMMITTEE ON EDUCATION AND LABOR U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS SECOND SESSION HEARING HELD IN WASHINGTON, DC, JUNE 26, 2008 Serial No. 110–99 Printed for the use of the Committee on Education and Labor ( Available on the Internet: http://www.gpoaccess.gov/congress/house/education/index.html U.S. GOVERNMENT PRINTING OFFICE 43–027 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate 0ct 09 2002 10:55 Dec 17, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\DOCS\110TH\HELP\110-99\43027.TXT HBUD PsN: DICK COMMITTEE ON EDUCATION AND LABOR GEORGE MILLER, California, Chairman Dale E. Kildee, Michigan, Vice Chairman Donald M. Payne, New Jersey Robert E. Andrews, New Jersey Robert C. ‘‘Bobby’’ Scott, Virginia Lynn C. Woolsey, California ´ Ruben Hinojosa, Texas Carolyn McCarthy, New York John F. Tierney, Massachusetts Dennis J. Kucinich, Ohio David Wu, Oregon Rush D. Holt, New Jersey Susan A. Davis, California Danny K. Davis, Illinois ´ Raul M. Grijalva, Arizona Timothy H. Bishop, New York ´ Linda T. Sanchez, California John P. Sarbanes, Maryland Joe Sestak, Pennsylvania David Loebsack, Iowa Mazie Hirono, Hawaii Jason Altmire, Pennsylvania John A. Yarmuth, Kentucky Phil Hare, Illinois Yvette...

Words: 49958 - Pages: 200

Free Essay

Capstone

...financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to meet the demands of continued success. table of contents: Staff …………………………………………………………………………………………………………………………………………. 3 Network Requirements ……………………………………………………………………………………………………………. 4 WAN Design ……………………………………………………………………………………………………………………………...

Words: 18593 - Pages: 75

Premium Essay

B2B Brand Management

...B2B Brand Management Philip Kotler ´ Waldemar Pfoertsch B2B Brand Management With the Cooperation of Ines Michi With 76 Figures and 7 Tables 12 Philip Kotler S. C. Johnson & Son Distinguished Professor of International Marketing Kellogg School of Business Northwestern University 2001 Sheridan Rd. Evanston, IL 60208, USA p-kotler@kellogg.northwestern.edu Waldemar Pfoertsch Professor International Business Pforzheim University Tiefenbronnerstrasse 65 75175 Pforzheim, Germany waldemar.pfoertsch@pforzheim-university.de ISBN-10 3-540-25360-2 Springer Berlin Heidelberg New York ISBN-13 978-3-540-25360-0 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2006930595 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered...

Words: 104254 - Pages: 418

Free Essay

Bush

...FAMILY OF SECRETS The Bush Dynasty, America’s Invisible Government, and the Hidden History of the Last Fifty Years RUSS BAKER Contents Foreword by James Moore 1. How Did Bush Happen? 2. Poppy’s Secret 3. Viva Zapata 4. Where Was Poppy? 5. Oswald’s Friend 6. The Hit 7. After Camelot 8. Wings for W. 9. The Nixonian Bushes 10. Downing Nixon, Part I: The Setup 11. Downing Nixon, Part II: The Execution 12. In from the Cold 13. Poppy’s Proxy and the Saudis 14. Poppy’s Web 15. The Handoff 16. The Quacking Duck 17. Playing Hardball 18. Meet the Help 19. The Conversion 20. The Skeleton in W.’s Closet 21. Shock and . . . Oil? 22. Deflection for Reelection 23. Domestic Disturbance 24. Conclusion Afterword Author’s Note Acknowledgments Notes Foreword When a governor or any state official seeks elective national office, his (or her) reputation and what the country knows about the candidate’s background is initially determined by the work of local and regional media. Generally, those journalists do a competent job of reporting on the prospect’s record. In the case of Governor George W. Bush, Texas reporters had written numerous stories about his failed businesses in the oil patch, the dubious land grab and questionable funding behind a new stadium for Bush’s baseball team, the Texas Rangers, and his various political contradictions and hypocrisies while serving in Austin. I was one of those Texas journalists. I spent about a decade...

Words: 249168 - Pages: 997

Premium Essay

Philosophy and Design

...Light University of Washington Seattle USA Peter Kroes Delft University of Technology Delft the Netherlands Steven A. Moore University of Texas Austin USA ISBN 978-1-4020-6590-3 e-ISBN 978-1-4020-6591-0 Library of Congress Control Number: 2007937486 © 2008 Springer Science + Business Media B.V. No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Printed on acid-free paper. 9 8 7 6 5 4 3 2 1 springer.com Contents List of Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Design in Engineering and Architecture: Towards an Integrated Philosophical Understanding . . . . . . . . . . . . . . . . . Peter Kroes, Andrew Light, Steven A. Moore, and Pieter E. Vermaas Part I Engineering Design ix 1 Design, Use, and the Physical and Intentional Aspects of Technical Artifacts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Maarten Franssen Designing is the Construction of Use Plans . . . . . . . . . . . . . . . . . . . . . . . . . . Wybo Houkes The Designer Fallacy and Technological Imagination . . . . . . . . . . . . . . . . . Don Ihde...

Words: 165744 - Pages: 663

Premium Essay

Cherys

...FCjhANALYZING CHINA’S AUTOMOBILE INDUSTRY COMPETITIVENESS THROUGH PORTER’S DIAMOND MODEL DI WU Bachelor of Management, University of Lethbridge, 2004 A Research Project Submitted to the School of Graduate Studies of the University of Lethbridge in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE IN MANAGEMENT Faculty of Management University of Lethbridge LETHBRIDGE, ALBERTA, CANADA © Di Wu, 2006 (Approval/ Signature page) ii Abstract This paper incorporates Porter’s diamond model to analyze China’s automobile industry. Besides looking at the four determinants of competitiveness in the original model, this study specifically examines the impact of government on industry competitiveness. This study retrieves archival data on multi-measurements used in prior studies. The author incorporates one case study of a Chinese auto firm to illustrate the specific impact of government policy and the responses of auto assemblers and component suppliers. Interviews with experts in auto-related industries are conducted to triangulate the findings. Results show that the Chinese auto industry is still in its early stages of development, whereas product quality and economies of scale of domestic automakers are approaching global standards; thus Chinese auto firms aim at becoming major players in the international market. The government plays an active role in assisting the industry development as the nation transitions from a planned economy to a free...

Words: 30906 - Pages: 124

Premium Essay

Mergers and Acquisitions Basics

...Mergers and Acquisitions Basics Mergers and Acquisitions Basics All You Need To Know Donald DePamphilis Amsterdam • Boston • Heidelberg • London New York • Oxford • Paris • San Diego San Francisco • Singapore • Sydney • Tokyo Academic Press is an imprint of Elsevier  Academic Press is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA Elsevier, The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK Copyright © 2011 Elsevier Inc. All rights reserved No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge...

Words: 105288 - Pages: 422