Professional Documents
Culture Documents
Network
Technology
Group Members:
Ayesha Lata- S11003003
WEEK 11 CASE STUDY TUTORIAL
Nitlesh Buttru- S11190954
Yonal Sen – S11123891
Rahul Prasad- S11108216
Siddarth Singh- S11121210
Response Layout
1. Introduction
2. Relevance to the Course
3. Dissection of the Case Study
4. Solutions
5. Recommendation
6. Conclusion
Case Study Question
Traffic Padding
Physical security
Cryptographic Security
The encrypted Data is sent where the data is changed into unreadable form and when the data is received by the
authorized person the data is decrypted so that it is readable. This is done by using Encryption Program or Hash coding.
Message Digest – data is encrypted with no recovery
Two types of Keys used in Cryptographic Process- Symmetric key system and Public (Asymmetric) key system.
Why western bank is moving online
01 Conclusion
terminals still require a high level of security. These terminals are critical
targets for tampering, so security for the standard PCI PTS addresses must
include physical protection and broad use of cryptography
02 Conclusion
hardware, security can pertain to a device used to scan a system or
monitor network traffic.
Western Bank should use a public key encryption because with a single key
03 Recommendation encryption, keys must be shared among the senders and receivers very
carefully.
Companies often do not want one company to be able to read messages they
04 Recommendation
send to another company, so this means that there must be a separate key
used for communication with each company. These keys must be recorded but
kept secure so that they cannot be stolen.
Thank You!!