Sie sind auf Seite 1von 8

MOSHOOD ABIOLA POLYTECHNIC

P.M.B 2210 OJERE ABEOKUTA OGUN STATE

DEPARTMENT:
COMPUTER SCIENCE

LEVEL:
HND 1 FT

COURSE CODE:
COM 327

COURSE TITLE:
COMPUTER SECURITY II

BY
TYTLER SAMUEL ABIODUN

MATRIC NO:
12/69/0028
LECTURER IN CHARGE
Mrs . BUKOLA ADEBAYO

1
HIGHLIGHT AND EXPLAIN HOW SECURITY CAN BE IMPLEMENTED
ON YOUR COMPUTER
1. User account access control
2. Firewalls Prevention
3. Intrusion Detection System
4. Response.
5. Establish strong passwords

User account access controls and cryptography can protect systems files and data,
respectively.
Firewalls are by far the most common prevention systems from a network security
perspective as they can (if properly configured) shield access to internal network services,
and block certain kinds of attacks through packet filtering. Firewalls can be both hardware-
or software-based.
Intrusion Detection System (IDS) products are designed to detect network attacks in-
progress and assist in post-attack forensics, while audit trails and logs serve a similar
function for individual systems.
"Response" is necessarily defined by the assessed security requirements of an individual
system and may cover the range from simple upgrade of protections to notification
of legal authorities, counter-attacks, and the like. In some special cases, a complete
destruction of the compromised system is favored, as it may happen that not all the
compromised resources are detected.
Establish strong passwords : Implementing strong passwords is the easiest thing
you can do to strengthen your security. Cloutier shares his tip for crafting a hard-to-crack
password: use a combination of capital and lower-case letters, numbers and symbols and
make it 8 to 12 characters long.
According to Microsoft, you should definitely avoid using: any personal data (such as your
birthdate), common words spelled backwards and sequences of characters or numbers, or
those that are close together on the keyboard.
Use their convenient password checker to see how strong yours is.
Today, computer security comprises mainly "preventive" measures, like firewalls or an exit
procedure. A firewall can be defined as a way of filtering network data between a host or a
network and another network, such as the Internet, and can be implemented as software running
on the machine, hooking into the network stack (or, in the case of most UNIX-based operating

2
systems such as Linux, built into the operating system kernel) to provide real time filtering and
blocking. Another implementation is a so-called physical firewall which consists of a separate
machine filtering network traffic. Firewalls are common amongst machines that are permanently
connected to the Internet.
ASSIGNMENT TWO
DESIGN A CHATTING FORUM APPLICATION WHERE YOUR
MESSAGE WILL BE ENCRYPTED USING CIPHER ALGORITHMS

A CLIENT AND SERVER CHAT INTERFACE WITH ENCRYPTION AND


DECRYPTION FUNTIONALITY

3
SOURCE CODE
package com.simplecode.action;

import java.security.Key;

import javax.crypto.Cipher;
import javax.crypto.spec.SecretKeySpec;

import sun.misc.*;

public class AES


{
private static String algorithm = "AES";
private static byte[] keyValue=new byte[]
{ 'A', 'S', 'e', 'c', 'u', 'r', 'e', 'S', 'e', 'c', 'r', 'e', 't', 'K',
'e', 'y' };

// Performs Encryption
public static String encrypt(String plainText) throws Exception
{
Key key = generateKey();
Cipher chiper = Cipher.getInstance(algorithm);
chiper.init(Cipher.ENCRYPT_MODE, key);
byte[] encVal = chiper.doFinal(plainText.getBytes());
String encryptedValue = new
BASE64Encoder().encode(encVal);
return encryptedValue;
}

// Performs decryption
public static String decrypt(String encryptedText) throws
Exception
{
// generate key
Key key = generateKey();

4
Cipher chiper = Cipher.getInstance(algorithm);
chiper.init(Cipher.DECRYPT_MODE, key);
byte[] decordedValue = new
BASE64Decoder().decodeBuffer(encryptedText);
byte[] decValue = chiper.doFinal(decordedValue);
String decryptedValue = new String(decValue);
return decryptedValue;
}

//generateKey() is used to generate a secret key for AES algorithm


private static Key generateKey() throws Exception
{
Key key = new SecretKeySpec(keyValue, algorithm);
return key;
}

// performs encryption & decryption


public static void main(String[] args) throws Exception
{

String plainText = "Password";


String encryptedText = AES.encrypt(plainText);
String decryptedText = AES.decrypt(encryptedText);

System.out.println("Plain Text : " + plainText);


System.out.println("Encrypted Text : " + encryptedText);
System.out.println("Decrypted Text : " + decryptedText);
}
}

5
THE ADDITIVE CIPHER CODE SOURCE USE IN THE CHAT
APPLICATION

6
THE SERVERWINDOW.JAVA VIEW

7
MULTIPLICATIVE CIPHER USE IN THE CHAT APPLICATION

Das könnte Ihnen auch gefallen