Describe circumstance where false negative are significantly

Assignment Help Computer Engineering
Reference no: EM131929903

Assessment

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Answers MUST be written in your own words. If an answer contains more than 10% direct quote (referenced or unreferenced), 0 marks will be awarded for this question. One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated. For mathematical questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.

Question 1

Automated Teller Machines (ATM) are designed so that users will provide a personal identification number (PIN) and a card to access their bank accounts. Give examples of confidentiality, integrity and availability requirements associated in such a system and describe the degree of importance for each requirement.

Question 2

A thief broke into an Automated Teller Machine (ATM) using a screwdriver and was able to jam the card reader as well as breaking five keys from the keypad. The thief had to halt the process of break-in and hide, as a customer approached to use the ATM. The customer was able to successfully enter their ATM card, punch in the 4 digit PIN and was able to draw out some cash. Since the card reader was jammed, the customer was however not able to withdraw the ATM card, and drove off to seek some help. In the meantime, the thief came back and decided to try to discover the customer's PIN so that he can steal money from the customer. You are required to calculate the maximum number of PINs that the thief may have to enter before correctly discovering the customer's PIN?

Question 3

Thinking about bio-metric authentication, list three reasons why people may be reluctant to use bio-metrics. Describe various ways of how to counter those objections.

Question 4

In bio-metric authentication, false positive and false negative rates can be tuned according to the requirement, and they are often complementary i.e. raising one lowers the other. Describe two circumstances where false negatives are significantly more serious than false positives.

Question 5

Transposition is one known method of encrypting the text. What can be one way that a piece of cipher text can be determined quickly if it was likely a result of a transposition? Utilising some of the decryption techniques (substitution and others) covered in the subject so far, you are required to decipher (find the plain text) the cipher text that will be proviced to you closer to the assessment due date via the subject site. In order to present your solution, you need to demonstrate and explain the steps taken to decipher this text.

Reference no: EM131929903

Questions Cloud

Write a detailed setup of network devices only for a lan : Create an appropriate framework and standards for the planned network. Write a detailed setup of network devices only for a LAN.
What is the weakest link in this methodology : Based on this information, find the optimum in-stock probability for the item.
Would you build the large or small factory : If the land is rezoned, what is the expected 1-year return on investment (ROI) for each of the two factory options? Would you build the large or small factory?
Charge of hiring coaches for the upcoming season : You are the chief administrator of a local youth softball league in charge of hiring coaches for the upcoming season. The coaches are not well paid
Describe circumstance where false negative are significantly : Describe two circumstances where false negatives are significantly more serious than false positives.
Conscientiousness is a big five personality dimension : Both terminal and instrumental values differ across groups, & these differences can encourage conflict or agreement when the groups have to deal with each other
Construct a confidence interval for the market value of car : Sruti Singh (see Problem) would like to investigate the effect of adding the age of the car (in years) to the regression model.
Which competencies did she demonstrate : What was Traci Lynn's recipe for success? Which competencies did she demonstrate?
Construct an in-service powerpoint to present : You are the HIM director at Yankee Memorial Hospital. You have been asked to familiarize yourself with cultural diversity and train your staff.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design function that will delete the entry with largest key

Design a function that will delete the entry with the largest key (the root) from the top of the heap and restore heap properties of resulting, smaller list.

  The calling statement should then print out

Using conditional operator and the cal_days_in_month (CAL_GREGORIAN, int month, int year) function, find out  the number of days in the current month and output to the browser whether it is a normal month or a leap month (29 days).

  Describe time method for joining tand u into a single tree

Describe an O(logn + logm) time method for joining Tand U into a single tree that stores all the entries in T and U.

  What difficulties present themselves

If a computer is capable only of manipulating and storing integers, what difficulties present themselves? How are these difficulties overcome?

  How would go about preventing unwanted eyes

the Director of Human Resources has a file documenting the pay rates of all employees. How will you prevent users on the network from actually being able to see the file on that particular workstation.

  Write a program that draws five concentric squares

Write a program that draws a brick wall pattern in which each row of bricks is offset from the row above and below it.

  Explain the bellman-ford and dijkstra algorithms

Find the shortest path tree from every node to node 1 for the graph of Fig. using the Bellman-Ford and Dijkstra algorithms.

  How does a table adapter differ from a data adapter

What happens when you drag a dataset table from the Data Sources window onto a blank form? How does a table adapter differ from a data adapter?

  Handling of global ethics issue by organizations

Our textbook describes the ethics as “the principles of right and wrong which individuals utilize in order to make choices in order to guide their behaviors”.One global ethical issue is software piracy. What can the organizations such as Microsoft ..

  Prove the seventh design criterion for p-boxes by checking

Prove the seventh design criterion for P-boxes by checking the relationship between S-box 5 in round 4 and S-box 7 in round 5.

  Contrast at least five computer forensics tools

Write the introductory paragraphs of your term paper (following the table of contents page) underneath the title of your paper. The introductory paragraphs should be at least one page long. These paragraphs should provide the reader with an overvi..

  How to show the mortgage payment amount

Modify the mortgage program to allow the user to input the amount of a mortgage and then choose from a menu of mortgage loans: 7 year at 5.35%, 15 year at 5.5 %, and 30 year at 5.75%. Use an array for the different loans.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd