NETWORK AND DATA SECURITY assignment

本文为一篇关于网络与数据安全的小组报告,重点探讨了块加密技术,包括块密码与流密码的区别,数据加密标准(DES),Feistel密码结构,以及各种工作模式如ECB、CBC、OFB、CFB和CTR的优缺点。报告旨在展示密码学和数据安全的基本原理,并评估在网络安全领域的伦理问题。小组成员需合作完成10至20页的报告,包含个人贡献评估,遵循特定格式和截止日期提交。
摘要由CSDN通过智能技术生成

ASSIGNMENT 2
CCN20203
SUBJECT: NETWORK AND DATA SECURITY
INSTRUCTION:

  1. Mode: Group (Maximum 4 students)
  2. Report MUST contain minimum pages of 10 and maximum of 20 with
    presentation
  3. Cover Page Color: Yellow. 4. Cover Page Format: Include all team members detail - name and id, MSU
    Logo, Title, and Picture of the group members.
  4. Submission in the form of Hard Copy and a Soft Copy to submitted through
    Google Classroom.
  5. Date of Submission: Oct. 16, 2020 (Friday)
    CHAPTER:
    Chapter 3: Block Ciphers
    WEIGHTAGE: 20%
    5% - Peer Assessment Collaboration (Individual) – 25 marks
    15% - Report (Group) – 75 marks
    PROGRAM OUTCOME(S):
    PO1 Expose to both the principles and concepts of cryptography and data
    security
    PO6 Be aware of current and developing principles and practices within forensic
    computing field.
    COURSE OUTCOME(S):
    CO1 Demonstrate the concept of cryptography and data security
    CO2&
    CO5
    Evaluate ethical problems that related to network security filed, and able to
    indicate which of them may be unique to computing and what makes each
    unique.

Contents
In this assignment, each group should write a report on Block Ciphers.
The topics below are to be covered by the assignment:

  1. Introduction to Block Ciphers
  2. Block vs Stream Ciphers
  3. Data Encryption Standard (DES)
  4. Feistel Cipher
  5. Modes of Operation
    5.1 Electronic Code Book (ECB)  Advantages and limitations
    5.2 Cipher Block Chaining (CBC)  Advantages and limitations
    5.3 Output Feedback (OFB) and Cipher Feedback (CFB)  Advantages and limitations
    5.4 Counter (CTR)  Advantages and limitations
    6 Summary.
  6. References
    FORMAT: Font: Arial, Size: 12, Line spacing: 1.5
    ASSESSMENT:
    Report will be evaluated based on the rubrics attached.
    Note: Copying from the lecture note or from other groups’ assignments is
    STRICTLY NOT ALOWED.
    PEER ASSESSMENT COLLABORATION RUBRIC (5% - (Individual) – 25 marks)
    Name:
    ID:
    CATEGORY Excellent Good Satisfactory Needs Improvement
    5 4 3 1-2
    Discipline Excellent in their
    discipline Good in their discipline Some discipline problem Weak in their discipline
    Participation Did the task successfully
    with full dedication.
    Did the task successfully
    but lack of dedication.
    Did not significantly
    participate in the given
    task.
    Did not participate in
    the given task.
    Teamwork
    Works well with others.
    Assumes a clear role in
    decision making and
    responsibilities.
    Works well with others.
    Takes part in most
    decisions and shares in
    the responsibilities.
    Works with others, but
    has difficulty sharing
    decisions and
    responsibilities
    Cannot work with others
    in most situations.
    Cannot share decisions
    or responsibilities
    Cooperation
    Excellent in their
    cooperation before,
    during and after this
    project
    Good in their
    cooperation before,
    during and after this
    project
    Only cooperate during
    this programme
    Even during this
    programme this student
    not well cooperate
    Listening
    Group member listened
    carefully to others’
    ideas.
    Group member usually
    listened to others’ ideas.
    Group member
    sometimes did not listen
    to others’ ideas.
    Group member did not
    listen to others and
    often interrupted them.
    Other Team Members
    Dis
    cipline
    Par
    ticipation
    Tea
    mwork
    Coo
    peration
    List
    ening
    Total

Total /25
Note:  Every student must individually fill up the name and ID fields and ask the group members to
evaluate his/her contribution.
 The lecturer has the right to ask the group members to present their assignment if the group
assessment is misused.
REPORT RUBRIC (15% - (Group) – 75 marks)
Grading
Criteria Wtg Excellent
5
Above average
4
Average
3
Fair
2
Low
1 0
Mark
(Wtg x
Score)
Introduction 1.0
• Excellent introduction
with good choice of
definition and citation. • Clear and
comprehensive
explanation on the
concept of the topic and
supported with good
example.
• Good and clear
introduction with proper
definition of the topic. • Good explanation on the topic concept and
supported with example.
• Clear and acceptable
definition of the topic. • Concept of the topic is
properly explained and
supported with example.
• Acceptable introduction,
but with plenty of room for
improvement. • Quite clear explanation on the definition and
concept of the topic. • Unclear definition or concept of the topic.
No
intro.
Data
Encryption
Standard
2.0
• All the points are explained very clearly and
engaging the reader. • Most points are clearly
explained. • Most of the points are acceptable. • Some of the points are acceptable. • Most points are not
related to the topic.
No or
wrong
content
Feistel Cipher 2.0
• All the points are explained very clearly and
engaging the reader. • Most points are clearly
explained. • Most of the points are acceptable. • Some of the points are acceptable. • Most points are not
related to the topic.
No or
wrong
content
Modes of
Operation 8.0
• All the points are explained very clearly and
engaging the reader. • Most points are clearly
explained. • Most of the points are acceptable. • Some of the points are acceptable. • Most points are not
related to the topic.
No or
wrong
content
Conclusion 1.0
• An excellent conclusion
which inclusively states all
main ideas/points of the
topic discussed. • All points are well
integrated and excellent
flow of ideas.
• A good conclusion
which states all main
ideas/points of the topic
discussed. • Some points are integrated and with good
flow of ideas.
• Acceptable conclusion
which states all main
ideas/points of the topic. • Some points are integrated and there is a good flow of ideas in the
discussion.
• A fair conclusion which
summarizes some of the
main ideas/points. • A few points are integrated but the ideas
don’t flow smoothly. • Very brief or not related
conclusion on the topic.
No
Conc.
References &
Citation 1.0
APA style is well adopted
for all citation and
references.
APA style is well
adopted, but with few
minor mistakes.
APA style of writing is
adopted but with some
mistakes or missing
citation/references.
APA style of writing is
adopted inconsistently and
with some major mistakes
or missing
citation/references.
Poor citation/references
and did not follow APA
style.
No Ref.
or Cite.
Total 15 /75

数据可视化是使用图表、图形和其他视觉元素有效地传达数据和信息的过程。通过Python编程语言进行数据可视化,可以利用其强大的数据处理和绘图库来实现。在数据可视化与Python的期末作业中,我们将通过以下步骤来完成任务。 首先,我们需要选择一个数据集。这个数据集可以是从网上获取的公开数据,也可以是自己收集的数据。接下来,我们需要对数据集进行预处理,包括数据清洗、处理缺失值、统一数据格式等步骤。 然后,我们可以利用Python的数据可视化库,如matplotlib、seaborn等,来对数据进行可视化分析。我们可以选择合适的图表类型,如折线图、散点图、柱状图等,来展示数据之间的关系和趋势。 在完成基本的可视化之后,我们还可以通过添加交互功能,使得图表更加具有动态性和实用性。例如,添加鼠标悬停效果、选择过滤数据等功能,让用户可以更加灵活地探索数据。 最后,我们需要撰写报告或者演示文稿,将数据可视化的结果呈现给其他人。在报告中,我们可以解释数据可视化的目的、分析结果和结论,以及对未来可能的行动建议。 通过完成这个期末作业,我们将深入了解数据可视化的重要性和实际操作技能,为日后在数据分析和决策中提供更好的帮助。同时,我们还可以在未来的工作和学习中,利用Python进行更加高效和专业的数据可视化分析。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值