Fileverifier ++
1. Based on your reading of chapter 1 – Introduction to Management of Information Security,
and Chapter 12 – Protection mechanisms
a. which specific data security requirement does this application address? (20 points).
b. Please explain the rationale for your choice in the previous question. (30 points)
[Total: 50 points]
2. Please execute the following steps and provide your responses for actions d & e below
[Total: 50 points]. Fileverifier++ only works on a computer running Windows
Operating System.
a) creating a folder named “testfolder” on your desktop.
b) Create five TXT files in the “testfolder” and name them file10.txt, file20.txt, …,
file50.txt.
c) Enter “abcde” in file10.txt; enter “12345” in file30.txt. Save these files.
d) Generate hash code for all the files in the “testfolder” using the SHA256 encryption
algorithm, and keep them under protection. What is the generated hash code for each of
these five files? Please provide them below. (20 points). NOTE: Please take a
screenshot from Fileverifier showing your work in addition to completing the table
below.
File Name Hash Code
e) Now, you are an unauthorized user. Add a new line, “you are hacked,” on the second
line of file10.txt. How can you detect this edit using Fileverifier + +? Please provide your
screenshot from Fileverifier showing your work below. (30 points).