0% found this document useful (0 votes)
12 views3 pages

Cybersecurity Assignment 2 Details

The document compares MD5, SHA-256, and SHA-512, highlighting their hash lengths, speeds, security levels, and typical usages. It also outlines Wireshark's functions, including packet capture and protocol analysis, and discusses the importance of system integration analysis for ensuring compatibility and security. Additionally, it differentiates between authentication and authorization, and lists risks associated with unprotected broadband along with mitigation strategies.

Uploaded by

sharamaaaaaaa007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views3 pages

Cybersecurity Assignment 2 Details

The document compares MD5, SHA-256, and SHA-512, highlighting their hash lengths, speeds, security levels, and typical usages. It also outlines Wireshark's functions, including packet capture and protocol analysis, and discusses the importance of system integration analysis for ensuring compatibility and security. Additionally, it differentiates between authentication and authorization, and lists risks associated with unprotected broadband along with mitigation strategies.

Uploaded by

sharamaaaaaaa007
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment 2: Cybersecurity Fundamentals and System Security Tools

1. SHA-256, SHA-512, and MD5 Comparison

| Feature | MD5 | SHA-256 | SHA-512 |

|----------------|--------------------|------------------------|------------------------|

| Hash Length | 128-bit (32 hex) | 256-bit (64 hex) | 512-bit (128 hex) |

| Speed | Very fast | Moderate | Slower than SHA-256 |

| Security | Broken, collisions | Strong | Very strong |

| Usage | Legacy checksums | SSL, blockchain, etc. | Government, finance |

- MD5 is fast but insecure.

- SHA-256 is widely used and secure.

- SHA-512 is for high-security environments.

2. Functions of Wireshark

- Packet Capture: Monitors real-time network traffic.

- Protocol Analysis: Decodes 1000+ protocols.

- Filtering & Search: Narrow down specific packets (e.g., TCP, HTTP).

- Reassembly: Reconstructs data streams.

- Troubleshooting: Detects network latency, errors.

- Intrusion Detection: Identifies suspicious traffic like scans, malformed packets.

3. System Integration Analysis

Definition: Evaluation of interactions between hardware, software, databases, and networks.


Importance:

- Ensures interoperability and compatibility.

- Identifies conflicts or security gaps.

- Supports automation and centralized management.

- Essential for cloud migration and DevOps environments.

4. Authentication vs Authorization

| Concept | Authentication | Authorization |

|-----------------|----------------------------------------|--------------------------------------|

| Definition | Who you are | What you can access |

| Purpose | Identity verification | Permission checking |

| When | First (login stage) | After authentication |

| Real-World Example | Logging into Gmail with password | Accessing Gmail inbox (not admin)

Examples:

- Authentication: Fingerprint scan on phone.

- Authorization: HR staff accessing payroll records.

5. Risks of Unprotected Broadband

- Eavesdropping: Interception of sensitive data.

- Man-in-the-Middle Attacks: Altering/rerouting data.

- Malware Injection: Via compromised routers.

- Unauthorized Access: Exploiting open ports.


- Lack of Encryption: Plaintext traffic is readable.

Mitigation:

- Use VPNs, WPA3, firewalls, HTTPS, and secure router setups.

You might also like