Define alexandra intended to make billy

Assignment Help Computer Engineering
Reference no: EM131722690

Alexandra, a high net worth customer, banks on-line at Banking Bureau Services (BBS) and has agreed to use 3DES in communicating with BBS. One day, Alexandra received a statement that shows a debit of $10,000,000 from her account. On inquiring, she was told that the bank manager, Billy, transferred the money out of Alexandra's account and into an account of his own in an offshore bank. When reached via long distance in the Cayman Islands, Billy produced a message from Alexandra, properly encrypted with the agreed upon 3DES keys, saying: "Thanks for your many years of fine service, Billy. Please transfer $10,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Alexandra."

Alexandra filed suit against Billy, BBS and the government of the Cayman Islands, claiming that the message was a forgery, sent by Billy himself and asking for 5x damages for pain and suffering. Billy has responded by claiming that all procedures were followed properly and that Alexandra is filing a nuisance suit. You have been employed by BBS as a cryptographic expert to assist in the investigation of this matter, and will produce a report for the BBS Board of Directors, which will assist them in determining how to proceed in this matter.

Your report to the Board of Directors should address the following issues:

What can be determined from the facts as presented about whether Alexandra intended to make Billy a gift of $10,000,000?

Assuming BBS wishes to continue using only 3DES as its cryptographic system, what could BBS and Alexandra have done to protect against this controversy arising?

Would this controversy have arisen if BBS had been using AES rather than 3DES?

What can be determined from the facts as presented about whether Alexandra intended to make Billy a gift of $10,000,000?

Assuming BBS wishes to continue using only 3DES as its cryptographic system, what could BBS and Alexandra have done to protect against this controversy arising?

Would this controversy have arisen if BBS had been using AES rather than 3DES?

Clearly address these issues, with sufficient detail and background to allow the "cryptographic-ally challenged" Board of Directors to understand the issues involved and formulate plans for how to approach the immediate issue with Alexandra, and to continue business in the future, assuming that they want to continue using 3DES.

Reference no: EM131722690

Questions Cloud

Determine the treatment of alzheimer disease : Studies on treating Alzheimer's disease. Alzheimer's disease (AD) is a progressive disease of the brain. Much research has been conducted on how to treat AD.
Define several categories of threats to information security : discusses several categories of threats to information security. Study some practical cases of information security from the newspaper and websites
Examine how gender is expressed in different communities : Examine how gender is expressed in different communities and will provide you with an opportunity to discuss the status of women in various cultures.
Define a revenue center and a cost center : Define a revenue center, a cost center, a profit center, and an investment center. Give an example of each type of center
Define alexandra intended to make billy : What can be determined from the facts as presented about whether Alexandra intended to make Billy
Frederick douglass particularly to exodus : What are the biblical allusions made by Frederick Douglass particularly to exodus. what is the purpose of these allusions and where else did Douglass.
How might you assist the employees in the technical training : How might you assist the employees in the technical training they require in connection with the training topic you have chosen?
State the appropriate conclusion in the words of the problem : Crab-spiders hiding on flowers. Behavioral Ecology (January 2005) published the results of an experiment on crab-spiders' use of camouflage to hide.
Identify which set of instructions is superior : In a well-organized paragraph identify which set of instructions is superior and why (give three reasons). Be sure to support your analysis

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to break the stream into tokens

Your must tokenize the entire input stream, using the lexical specification below to dictate how to break the stream into tokens.

  Discuss the effectiveness of these security features

Secure Web sites often include 'enhanced security questions' or 'security images' in an attempt to assure that only authorized users could access the sites. Research and discuss effectiveness of these security features.

  Write a short memo explaining the concept to your boss

Using the Web, investigate the term, virtual desktop infrastructure (VDI). Write a short memo explaining the concept to your boss.

  Discuss assembler modifications needed to multiple-shift shr

SHR instruction must be enhanced to allow multiple shifts. The address field can be used to represent the shift count; for example, SHR 5 implies a shift right.

  Cellular network

Calculate how many users a cell may support for a 5% call blocking rate. Suppose that each user generates 35mE of load in the busy hour.

  Choose three or more types of testing

Write down the discussion as if you are the systems analyst briefing your CIO as the two of you are walking over to the steering committee meeting in which a "go/no go" decision will be made whether to go live with your new enterprise system (this..

  Describe the methods for establishing component priorities

Describe the methods for establishing component priorities, including Business functions and processes b. BIA scenarios and components c. Financial and service impact of components not being available d. Recovery time frameworks.

  Modify the minix 3 scheduler

Modify the MINIX 3 scheduler to keep track of how much CPU time each user process has had lately. When no task or server wants to run, pick the user process that has had the smallest share of the CPU.

  In addition you must simplify administration tasks for the

envision that you are a systems administrator managing five different web servers for your company. each web server

  What sorts of measures would you recommend

What sorts of measures would you recommend for minimizing changes to project schedules caused by non-availability of required human resources, or conflicts with the personal plans of project workers (e.g. vacations).

  A java based program to calculate the maximum heart rate

Write down a java based program to calculate the Maximum heart rate of person based on the person age and height. Notify for the low end of the target zone (65%) and high end of the target zone (90%).

  What are the pros of home networking

Do you find that most of the files are in real stored on a single computer or to you actually have a server configuration in your home with common files?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd