Course Project 1 IS370 Information Security
Course Project 1 IS370 Information Security
Course Project 1 IS370 Information Security
Assignment Unit 5
Park University
Instructor:
• (6 points) View the list (Links to an external site.) of security publications at NIST.
Pick one publication of interest to you. Summarize the contents of the document in a
paragraph and explain two key findings/conclusions. Be sure to cite all your work.
Answer:
The article that I picked for this homework is recommendations for federal Vulnerability
Disclosure Guidelines”. This article talks about encouraging government users including
DHS and DOD to use a digital product that reports a known or suspected security
vulnerability in a digital product. The main reason for this encouragement is to ensure
that vulnerabilities are known to the developers because not all vulnerabilities can be
found thru multiple kinds of testing. Lastly, it ensures awareness of threats to provide
critical information to the government on mitigating the risk.
• (6 points) Pick 3 review questions from p. 495-496 and answer each in a paragraph or
two. Search the web and find two sites that provide additional information regarding
each question. Provide citations for each of your six web pages.
Answer:
2. What was the earliest reason for the use of cryptography? The answer to these
questions is not as easy as it seems there are multiple reasons for cryptography, but
the main one is to conceal information. It is basically to provide information security
and secrecy. But a couple of the earliest records are from 1900 B.C the Egyptian
tablets that had cryptography on them, another one is from 50 B.C when Julius
Caesar used simple cipher substitutions to protect communication lines.
3. What are the components of PKI? The public key, Private key, CA, CS, Certificate
revocation list, and hardware security module.
• (6 points) Passwords that are hashed without the use of a salt are susceptible to a
Rainbow Table attack, where the hash is pre-computed and stored in an efficient
lookup table that allows for relatively fast retrieval of the original password. Some
password hashes that fall into this category are LM hash (Lanmanager) and NTHash
(sometimes called NTLM). Ophcrack is a program that uses Rainbow Tables to crack
password hashes. An online version is available at Objectif Securite (Links to an
external site.). Other sites maintain large databases of hash/password pairs. These
sites include Hash Killer (Links to an external site.) and Crack Station. (Links to
an external site.) Using these sites, find the password associated with the following
Hashes. Record the password and the site you used. You should be able to crack them
all, though not at a single site.
Answer:
• (2 points) Go to Online Hash Crack (Links to an external site.) and use the Hash
Generator to create two NTLM hashes based on your own passwords. Try these
against the previous sites and record your hashes and your results. Explain why you
needed to use two different sites, one to create the hashes and one to crack them.
Answer:
In my opinion, we needed to use multiple sites because not one site can crack a certain
password. Just like how my Password 1 wasn’t cracked thru any website that was
provided.
Password 1
NTLM : 3399BF8EA041C01BC49AE492EDFEF687
Password 2
NTLM: 1BA1B555C90A4C4303E9E4CC2108F0BA
Schaffer, K. (2021, June 7). SP 800–216 (Draft), Recommendations for Federal Vulnerability
https://csrc.nist.gov/publications/detail/sp/800-216/draft
https://militaryembedded.com/comms/encryption/cryptology-cryptography-
andcryptanalysis
Cryptography and Cryptanalysis: A New Kind of Science | Online by Stephen Wolfram [Page
https://www.wolframscience.com/nks/p598--cryptography-and-cryptanalysis/
Whitman, Michael E.; Mattord, Herbert J.. Principles of Information Security (p. 451). Cengage
A Brief History of Cryptography. (n.d.). Red Hat Customer Portal. Retrieved July 14, 2021, from
https://access.redhat.com/blogs/766093/posts/1976023
How Does PKI Work [Public Key Infrastructure Guide] | Venafi? (n.d.). Www.Venafi.Com.
doespki-work#:%7E:text=So%20how%20does%20PKI%20authentication,certificate
%20authority%2C%20and%20registration%20authority.
Ludin, J. (2019, March 11). Public Key Infrastructure: Explained. Security Boulevard.
https://securityboulevard.com/2019/03/public-key-infrastructure-explained/