Assignment title: Information
On successful completion of this assessment you should be able to: 1. Analyze networked systems to identify security requirements; 2. Evaluate and select appropriate security technologies for a given network situation; and 3. Apply cryptographic protocols to achieve a variety of security goals for a given online system; You will develop a model educational ransomware by applying the cryptography knowledge gained through lectures and tutorials. A basic ransomware may make use of almost all cryptographic services and mechanisms; and hence it forms the most suitable real-world application for IFN642. An individual will be responsible for building the necessary literature and background on ransomwares, you will address one specific payload of the final ransomware designa