California State University, Sacramento

Home
Syllabus
Assignments
Contact
Grades

Assignment 12

Points: 30
Due Date: 5/15
Reading: Tutorial 9 session 9.2




Questions from the reading:

  1. What is intellectual property?

  2. If used improperly, cookies can destroy the data on your pc. (T/F)

  3. What threat delivery mechanism has a mythical name, and how does it execute?

  4. When is a publication copyrighted?

  5. What information does a digital certificate usually contain?

  6. Explain the difference between symmetric and asymmetric encryption?

  7. What is the name for encrypted information?

  8. What is SSL and what does it do?

Data Encryption

Visit http://www.winzip.com and download the evaluation version of Winzip 8.1 (This application is approximately 1.71 MB). Winzip offers a way to compress files and encrypt data using the industry standard Zip 2.0 encryption format.

  1. For credit in this part of the assignment, attach a compressed and encrypted file when you e-mail me your assignment. Don't forget to send me the password too. You will receive credit if I can open your archived file using the password you supplied me.

See Winzip's Frequently asked Questions if you need help compressing files. Below are Winzip's instructions for password protecting a file. You can also find these instructions by clicking on the help menu after you have selected the password option.

Using password security while adding or updating an archive:

To password protect files, it is important to specify the password AFTER opening or creating an archive and BEFORE adding the files.

Follow these steps to password protect files in an archive:

  1. Open or create an archive. If you are using the New dialog box, uncheck the Add Dialog checkbox at the right of the dialog box.

  2. In the Add dialog box, click the Password button, and type a password.

Notes:

In addition to the methods specified above, you can choose Password from the Options menu to specify a password.

Use the Mask Password checkbox to control whether the password is hidden while typed. If you check this option, you will have to re-type the password for confirmation (to avoid typographical errors).

Passwords are cleared (reset so that no password is in effect) when an archive is closed or another archive is opened.

Passwords can also be used for ARJ files; in this case, the external ARJ program is responsible for all data encryption.

Be sure to remember any passwords you use, so that you can extract your files!

Security

How secure is your connection?

Go to http://grc.com/lt/leaktest.htm and download the program called the Firewall Leakage Tester written by the Gibson Research Corporation. The program runs without having to install anything, and is approximately 28 KB. Run the program by selecting the "Test for Leaks" button. The "help" button will toggle the display window on and off.

  1. Send me the results of running this test. This can be done by highlighting the resulting information with your mouse, holding down the CTRL+C key to copy the information, and then holding down the CTRL+V key to paste the text.

If you would like to find out more information about what this test does and firewall security see the documentation on how to use the program at http://grc.com/lt/howtouse.htm.

Ever wonder what applications on your computer connect to the internet? A program called zonealarm will notify you of what connections are coming in and going out of your computer. To find out more about this program see the documentation at http://www.zonealarm.com. They even provide a free copy for personal users. You might be surprised to see what applications on your PC are trying to connect to the internet. (You are not required to do anything with zonealarm for this assignment.)



Privacy

How private is your information?

Visit http://www.switchboard.com, and search for Scott Owen in Sacramento, CA. Your search should result in one record. Now, click the link labeled Personal Info.

  1. What is listed in the Additional Info row?

Do the same search for your name.

  1. Were you able to find any information?