Highlights
Q1) It seems likely that some form of vaccination certificate will be deployed in the European Union (EU) during 2021, but there is currently a dearth of technical detail describing the data formats, databases, administration and operation of such certificates. You are tasked by a human rights organisation to do a partlyspeculative risk and human-rights analysis of the technology aspects of such a scheme so that the organisation can react quickly when details of the actual scheme emerge. You can assume that the scheme will cover vaccination information (dates, places, dose details), that a mobile App or a printed-paper version will be supported and that vaccination certificates ought be verifiable at any EU member-state border, e.g., in an airport. In addition to vaccinations, the system may also support details of those who were infected but are now recovered and of (presumably negative) tests. In addition to potential privacy and human-rights issues, you also need to take into account that the proportions of populations that have been vaccinated will vary from country to country and over time which could have a major impact on the probability that forgery will be an interesting attack.
(a) Describe the (possibly speculative) design for overall system, that will form the basis for your analysis, and the process you would follow to evaluate that design.
(b) Describe three of the most significant risks you see in this scenario, including their potential impact and likelihood of occurrence, and outline the countermeasures you would recommend that the human-rights organisation ought lobby to see implemented either at national or EU level.
(c) Describe the criteria you would propose be used in order to phase out use of these vaccination certificates?
Q2) a) For any real Internet key exchange protocol (e.g. TLS, IPsec, or Kerberos) describe the key management and application data protection aspects of the protocol in detail. Describe how your chosen protocol behaves in the face of misconfiguration for at least two common examples of misconfiguration. Your answer may describe any widely used version of your chosen protocol, but you need to explicitly state which version you are describing.
(b) Research and describe an open-source implementation of your chosen protocol highlighting the external APIs used by applications and how those map to the key management and application data details you described in part (a). For example you might describe the OpenSSL or BoringSSL implementations of TLS, or the MIT Kerberos implementation.
Q3) You are part of a team developing a web-based messaging and email service designed for medium-scale deployments (of approx. 10,000 users) for use in sports clubs and associations of sports clubs. The system is intended to allow coaches to communicate with teams/panels, and with other club members. The system will also support person to person communication between members of different clubs that have signed up to the service. You could think of the service being based around a Whatsapp equivalent such as element/matrix.org or similar, with the addition of standard email services and abuse-reporting, but with users limited to paid-up members of affiliated clubs.
(a) Outline a design for the overall system (include a network diagram), and state the security and privacy requirements the overall system and the abuse-reporting subsystem must meet. Note that this part of your answer should only discuss security and privacy requirements and not describe how to meet those requirements.
(b) Describe, in detail, the solution you would propose for the abuse-reporting subsystem with a focus on the security and privacy mechanisms used to meet the requirements from part (a).
This CS7NS5 - IT Assignment has been solved by our IT experts at My Uni Paper. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2026 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.