Reference no: EM133119352
Chapter 1
Questions
1. Distinguish between vulnerability, threat, and control.
2. Theft usually results in some kind of harm. For example, if someone steals your car, you may suffer financial loss, inconvenience (by losing your mode of transportation), and emotional upset (because of invasion of your personal property and space). List three kinds of harm a company might experience from theft of computer equipment.
3. List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials.
4. List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.
5. List at least three kinds of harm a company could encounter from loss of service, that is, failure of availability. List the product or capability to which access is lost, and explain how this loss hurts the company.
Chapter 2
Questions
1. If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.
2. Defeating authentication follows the method-opportunity-motive paradigm described in Chapter One. Discuss how these three factors apply to an attack on authentication.
3. List three reasons people might be reluctant to use bio-metrics for authentication. Can you think of ways to counter those objections?
4. Humans are said to be the weakest link in any security system. Give an example for each of the following: (a) A situation in which human failure could lead to a compromise of encrypted data (b) A situation in which human failure could lead to a compromise of identification and authentication (c) A situation in which human failure could lead to a compromise of access control.
5. Why do cryptologists recommend changing the encryption key from time to time? Is it the same reason security experts recommend changing a password from time to time? How can one determine how frequently to change keys or passwords?
What is the value today of a money machine
: What is the value today of a money machine that will pay $1,437.00 per year for 18.00 years? Assume the first payment is made 5.00 years from today and the inte
|
Describe situation in which you have experienced harm
: Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not?
|
Number of assets in the portfolio
: Explain what happens to the risk of a portfolio as the number of assets in the portfolio is increased.
|
What is the rate of return on bee ltd shares
: The share price for Bee Ltd at 1 July 2020 was $3.40 and at 30 June 2021 was $4.80. You have collected the following per share dividend data for 2020 and 2021:
|
Distinguish between vulnerability-threat and control
: Distinguish between vulnerability, threat, and control. List three reasons people might be reluctant to use bio-metrics for authentication.
|
Present value of the cash flows
: The appropriate discount rate for the following cash flows is 6.88 percent per year. CF1 = 2,380, CF2 = 0, CF3 = 3,820, CF4 = 2,070. What is the present value o
|
Prepare amortization table by using ms excel
: On december 31, loren billingsley bought a yacht for $60,000, paying $15,000 down and agreeing to pay the balance in 10 equal annual installments include both p
|
Intelligence assets and information from foreign penetration
: You may choose to act as the United States brainstorm ways to protect its intelligence assets and information from foreign penetration
|
Calculate the expected return of portfolio
: You have invested $25,000 in Pfizer stock and $35,000 in Moderna stock. Pfizer stock has an expected return of 18% and volatility equal to 43%. Moderna stock ha
|