Examine malicious activities that may affect the security

Assignment Help Computer Engineering
Reference no: EM133042624

Security fundamentals

Learning outcome 1: be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.

Learning outcome 2: be able to explain the fundamental concepts of cryptographic algorithms.

Learning outcome 3: be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.

Learning outcome 4: be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.

Task

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the resources section of Interact site of this subject.

Problem 1
Automated Teller Machines (ATM) are designed so that users will provide a personal identification number (PIN) and a card to access their bank accounts. Give examples of confidentiality, integrity and availability requirements associated in such a system and describe the degree of importance for each requirement.

Problem 2
A thief broke into an Automated Teller Machine (ATM) using a screwdriver and was able to jam the card reader as well as breaking five keys from the keypad. The thief had to halt the process of break-in and hide, as a customer approached to use the ATM. The customer was able to successfully enter their ATM card, punch in the 4 digit PIN and was able to draw out some cash.

Since the card reader was jammed, the customer was however not able to withdraw the ATMcard, and drove off to seek some help. In the meantime, the thief came back and decided to try to discover the customer's PIN so that he can steal money from the customer. You are required to calculate the maximum number of PINs that the thief may have to enter before correctly discovering the customer's PIN?

Problem 3
Thinking about bio-metric authentication, list three reasons why people may be reluctant to use bio-metrics. Describe various ways of how to counter those objections.

Problem 4
In bio-metric authentication, false positive and false negative rates can be tuned according to the requirement, and they are often complementary i.e. raising one lowers the other. Describe two circumstances where false negatives are significantly more serious than false positives.

Problem 5
Transposition is one known method of encrypting the text. What can be one way that a piece of cipher text can be determined quickly if it was likely a result of a transposition? Utilisingsome of the decryption techniques (substitution and others) covered in the subject so far, you are required to decipher (find the plain text) the cipher text that will be proviced to you closer to the assessment due date via the subject site. In order to present your solution, you need to demonstrate and explain the steps taken to decipher this text.

Reference no: EM133042624

Questions Cloud

Risk management and assess IT risk in business terms : Justify the goals and various key terms used in risk management and assess IT risk in business terms - summary of the impact or consequence
What amount would you use for the cost of switching : If you were using NPV analysis to decide whether the company should switch to the net 30 credit policy, what amount would you use for the cost of switching
How much can be accumulated for retirement : How much can be accumulated for retirement if $2,000 is deposited annually, beginning one year from today, and the account earns 9 percent interest
What amount of dividend will a shareholder who owns : If the preference shares are cumulative and fully participating, what amount of dividend will a shareholder who owns 2,500 ordinary shares receive
Examine malicious activities that may affect the security : Examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats
What is the cost of goods sold under FIFO : Peg City Brews uses a perpetual inventory system and has the following beginning inventory, purchases, What is the cost of goods sold under FIFO
Determine suitability for a Cloud Computing delivery model : Compare and evaluate the ability of different cloud computing architectures to meet a set of given business requirements.
Develop a Vision Document : Describe the problem in your own words, and the capabilities and benefits. You need to create a Project Vision Document which contains
What is the equivalent annual saving from the purchase : The opportunity cost of capital is 8%, and the firm's tax rate is 21%. What is the equivalent annual saving from the purchase if Gluon can depreciate 100%

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is stored in the ready state property of an xhr object

What is required for an Ajax application to run on both IE6 and the latest versions of browsers? What is stored in the ready State property of an XHR object?

  Is there a flaw in this scheme

Information & Network Security. Alice and Bob agree to communicate privately via email using a scheme based on RC4, but they want to avoid using a new secret key for each transmission.

  Using the sentinel controlled while loop develop an

using the sentinel controlled while loop develop an algorithm using pseudocode for computing cosx and sin x for the

  Write some security planning documents for the department

For this assignment, you will write some security planning documents for the Computer Science department.

  Explain fundamental information security concepts

Task IoT security is concerned with safeguarding connected devices and networks in the Internet of things (IoT) environment. Research the issue of IoT security.

  Write a program that uses the x library to display a clock

Write a program that uses the X library to display a clock. The program should use the ctime() function to obtain the current time.

  Design the decoding circuitry

Arrange the 16 chips needed in the design of Problem (b) as a 4 x 4 array and design the decoding circuitry.

  Discuss problem of a stainless steel spherical tank

A stainless steel spherical tank, with an inner diameter of 3 m and a wall thickness of 10 mm, is used for containing a solution undergoing an exothermic.

  Write a function definition for a function called one more

Write a function definition for a function called one More, which has a formal parameter for an array of integers and increase value of each array element by 1.

  How blockchain may be used in the given industry

Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As IT manager, how would you embrace blockchain.

  Define the terms attributes sampling and variables sampling

Audit Sampling: Types of Audit Samples. You have been assigned to the audit of Phillip's Inc., a chain of convenience stores.

  Recognize trends in mobile software development and

imagine you are employed as a senior software engineer in a company that designs and produces mobile software

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd