Order from us for quality, customized work in due time of your choice.
create a word document with detailed report & ppt summarized for a 10 min presentation.
1: Firewall Technology
Imagine you work as a network security specialist at Emirates Islamic Bank in the
UAE. Your supervisor has assigned you to limit employees’ ability to visit well-
known social media platforms, including YouTube and Facebook. To achieve this,
you are to employ a Linux-based firewall system like iptables to establish the
necessary access restrictions and bolster security protocols. Describe the systematic
process you would follow to complete this task, addressing the technical procedures
as well as any potential effects on the bank’s network systems.
Q2: Cryptography
Briefly outline various cryptographic techniques. Apply these methods to encrypt
your first name, turning your theoretical knowledge of cryptography into a practical
exercise by encoding your first name using the techniques you’ve learned.
Case 1: Employing a Transposition Cipher with the key 8642013579
Case 2: Utilizing a Vigenere square substitution cipher with the key SUMMER
Case 3: Applying ASCII code XNOR Encryption with the key SUMMER
Requirements: detailed. worth 10-15 mins of presentation
I have attached a sample that can help
Order from us for quality, customized work in due time of your choice.