Cipher Tools

 

There are a variety of online cipher tools that demonstrate different cryptographic

algorithms. Visit the website Cipher Tools (rumkin.com/tools/cipher/) and explore the

different tools. Select three tools, one of which is mentioned in this chapter (ROT13, One-

Time Pad, etc.). Experiment with the three different tools. Which is easy to use? Which is more

difficult? Which tool would you justify to be more secure than the others? Why? Write a onepage

paper on your analysis of the tools.

 

Case Project 4-4: HTTPS

Hypertext Transport Protocol Secure (HTTPS) is becoming increasingly popular as a security

protocol for web traffic. Some sites automatically use HTTPS for all transactions (like Google),

while others require that users must configure it in their settings. Some argue that HTTPS should

be used on all web traffic. What are the advantages of HTTPS? What are its disadvantages? How

is it different from HTTP? How must the server be set up for HTTPS transactions? How would

it protect you using a public Wi-Fi connection at a local coffee shop? Should all web traffic be

required to use HTTPS? Why or why not? Write a one-page paper of your research.

 

Sample Solution

hackers yearn to learn how to penetrate firewalls and acquire information. Consequently, they end up gaining enough knowledge and skill. Eventually, the newcomers entering into the criminal world of doxing.

Acceptable Doxing

Doxing may have extremely damaging effects on individuals or groups of people. Nevertheless, some situations make it a legitimate tactic. First, payback can be a fair play. Doxing people who gain pleasure from doxing innocent individuals if acceptable and encouraged. The legal doctrine of estoppel takes care of all claims made by a victimizer-turned-victim . Similarly, it should be standard knowledge that what goes around always comes around and that no one should complain of the taste of their own medicine. With the rules of engagement set, the number of innocent persons who go through doxing should reduce due to mutually assured destruction. Alternatively, the impact of the effects of doxing would decrease due to information flooding.

Second, sometimes doxing can be used to reveal and unmask criminal groups hiding in society. Paedophiles, financial criminals, terrorists, and other individuals publicly engaging in activities that expose the public to harm should not be left to walk scot free. It is advisable to gather an informative dossier that can lead to their arrest and prosecution. Most of these criminals may be tempted to brag on social media about their achievements, and it is from such posts that one may piece together the identities of the real masterminds. This doxing is similar to unmasking an assailant and forwarding them to the police. This information should be submitted to law enforcers who are then expected to pursue a criminal investigation to add on to the information delivered to them from the efforts of community policing . Occasionally, the law enforcers may be unwilling to react to the situation due to various reasons. Consequently, the doxer may decide to use the sub-optimal option of going public hoping for extrajudicial punishment which is nobler than letting the innocent suffer in ways that one would have helped to stop.

Third, doxing can be used to effectively put in check corrupt and power-drunk politicians, leaders and government officials. These individuals abuse their powers and use public offices for their gains and those of their families. Doxers may be forced to collect damaging personal information of these thieves of public property and reveal it to relevant watchdogs or even to the citizens . The end result would be resignation, firing of being voted out of office. Alternatively, it may challenge them to redeem their actions and now serve their subjects diligently with the fear that further exploitation and abuse of office and

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.