This paper circulates around the core theme of 1. Assume that a security model is needed for protection of information in your class together with its essential aspects. It has been reviewed and purchased by the majority of students thus, this paper is rated 4.8 out of 5 points by the students. In addition to this, the price of this paper commences from £ 84. To get this paper written from the scratch, order this assignment now. 100% confidential, 100% plagiarism-free.
1. Assume that a security model is needed for protection of information in your class (i.e., CP5603 subject). Using the NSTISSC model, examine each of the cells (i.e. 27 cells associated with McCumber model) and write a brief statement on how you would address the three components represented in that cell. That is, University, Lecturer, Students, etc. trying to keep this subject totally secure (from those who have not enrolled in this subject). For example, a possible answer to (Conﬁdentiality - Education - Transmission) cell, could be as follow: An example of protecting the conﬁdentiality of class information that is being transmitted by means of education could be accomplished by training students and faculty, such as training the students and faculty to close doors to the classroom while in lecture so that others outside would not hear the lecture.
[9 marks, 1/3 mark to each entry]
2. Using the web, ﬁnd out who Kevin Mitnick was. What did he do? Who caught him? Write a short summary (about 500 words) of his activities and why he is famous.
3. Go to the Web site for PGP, (e.g., http://www.pgp.com/downloads/desktoptrial/index.htm). Download and install the trial version of PGP. Using PGP and your favorite e-mail program, send a PGP-signed e-mail to your instructor. What looks diﬀerent in this e-mail compared to your previous e-mails? Describe the procedure of obtaining the key and provide a comprehensive document that discusses the security of the key, and contains a user manual (in your chosen platform, e.g. Linux, Mac OS, MS Windows, etc.) for both parties, i.e. the sender and the receiver of a message that utilizes the PGP key. Discuss issues in the PGP’s trust model. (Your answer should be in the range of 1300-1500 words).
Note: Since publication PGP has changes this web site it still defaults from the above URL, but now the student should download the ”Desktop Trial Software” instead of the ”freeware version”
Requirements and Method of Submission:
You are required to upload your solution to LearnJCU’s Assignment Box.
From documentation point of view, solution must contain your name, comments, and references.
Marking criteria: See Section 6 of the Subject Guide. Deduction: • Deduction of 2 marks if the submission does not have the student’s name. • Deduction of 5 marks if the materials are not referenced properly, i.e., references must appear in the text, e.g. using IEEE  style. That is, having a list of references at the end of the report, without citation in the text, is not enough