QUESTION 1: You have been hired to investigate the computer usage…QUESTION 1:You have been hired to investigate the computer usage of an individual with known previous criminal activity and have been given legitimate access to their computer, just after they have hastily left their premises. They left their machine running, and still logged in, which encourages you. However, to your dismay, when you look at their file system, you find they have deleted all the files. Worse, when you inspect their drives using appropriate tools, you find they have been securely erased. A colleague suggests you turn the machine off, as it has no value. How would you proceed and why?QUESTION 2:a.i.For each of the following situations, state in one or two sentences whether it benefits from hashing (or not) and explain why (or why not):? Obscuring passwords stored in a database.? Keeping the contents of messages confidential.? Identifying duplicate files.? Signing a file to show authorship.? Checking for a file’s integrity when it is sent over a network.ii.You have been requested to improve the security of a computer encryption system from 12-bit encryption to 16-bit system.? How many possible keys are available in the 12-bit system?? How many possible keys are available in the 16-bit system?? How much more secure is the new 16-bit system? (Show how you obtain your answer).b.Bob and Alice need to send each other high-definition video files. These need to be encrypted but they are concerned that asymmetric encryption might prove too slow. However, they live too far apart to be able to safely share a symmetric encryption key.Explain how Bob and Alice might use an asymmetric encryption system to produce a session key and whether that will solve their problems. Can they re-use the session key?QUESTION 3:With recent advances in network technology as well as the methods used by organisations to protect their systems, some commentators have described the Computer Misuse Act (CMA) as now becoming outdated.Use the OU library to search for the following article ‘Call for revisions to Computer Misuse Act’ (Network Security, 2020).i.What issues with the CMA does this article raise?ii.What recommendations does the article make?The maximum word limit for Question 5(a) is 120 words.b.After divulging secrets to a rival company, an employee has recently been dismissed from an organisation. Before the employee was dismissed, the network administrator started to notice unusual network activity as well as repeated failed login attempts to servers that held customer information. After the employee was dismissed, there was a Denial of Service (DoS) attack (SYN flood) on the company web server that rendered the website and intranet unusable for two days. This DoS attack was traced to the ex-employee’s home computer IP address. The ex-employee was subsequently charged under the CMA.What section of the CMA do you think the ex-employee was charged with? Make sure to explain your answer, justifying your choice.c.Carry out some more additional research into DoS attacks.i.Briefly describe what is meant by a SYN flood attack.ii.Identify two preventative measures that can be taken to protect against DoS attacks.Note:on this occasion, you do not need to include a reference for your source. Engineering & Technology Computer Science COMMPUTING TM112-19D

Order your essay today and save 20% with the discount code ESSAYHELP