CITM820 Assignment-2
CITM820 Assignment-2
CITM820 Assignment-2
Write a report (350 words excluding references) regarding the following topic:
What is the role of AI devices such as IoT in today’s business (e.g., healthcare, machine-to-
machine [M2M], business automation, smart city)? What security threats and challenges they
may create for society, organizations, and individuals?
PART B: Step-by-Step instruction to generate SHA & CRC checksum to check the
authenticity of files (20%)
B1:
Step 1: Unzip the file digsum-1.0.1.zip
Step 2: Copy all .exe (e.g., sha1sum.exe, sha256sum.exe, md5sum.exe and crc32sum.exe) files to
C:\Windows directory (Note: you need to have administrative rights to do so)
Conclusion:
Since anyone can download a tool like Wireshark and sniff packets (not just their own) passing
by their network adaptor, and anyone can translate from Base64 to ASCII (you just did it!), it
should be clear to you that simple passwords on WWW sites are not secure unless additional
measures are taken.