Examine malicious activities that may affect the security

Assignment Help Computer Engineering
Reference no: EM133042624

Security fundamentals

Learning outcome 1: be able to justify security goals and the importance of maintaining the secure computing environment against digital threats.

Learning outcome 2: be able to explain the fundamental concepts of cryptographic algorithms.

Learning outcome 3: be able to examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats.

Learning outcome 4: be able to compare and contrast foundational security policies and models that deal with integrity and confidentiality.

Task

This assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.

Note that the guide for APA referencing is provided in the resources section of Interact site of this subject.

Problem 1
Automated Teller Machines (ATM) are designed so that users will provide a personal identification number (PIN) and a card to access their bank accounts. Give examples of confidentiality, integrity and availability requirements associated in such a system and describe the degree of importance for each requirement.

Problem 2
A thief broke into an Automated Teller Machine (ATM) using a screwdriver and was able to jam the card reader as well as breaking five keys from the keypad. The thief had to halt the process of break-in and hide, as a customer approached to use the ATM. The customer was able to successfully enter their ATM card, punch in the 4 digit PIN and was able to draw out some cash.

Since the card reader was jammed, the customer was however not able to withdraw the ATMcard, and drove off to seek some help. In the meantime, the thief came back and decided to try to discover the customer's PIN so that he can steal money from the customer. You are required to calculate the maximum number of PINs that the thief may have to enter before correctly discovering the customer's PIN?

Problem 3
Thinking about bio-metric authentication, list three reasons why people may be reluctant to use bio-metrics. Describe various ways of how to counter those objections.

Problem 4
In bio-metric authentication, false positive and false negative rates can be tuned according to the requirement, and they are often complementary i.e. raising one lowers the other. Describe two circumstances where false negatives are significantly more serious than false positives.

Problem 5
Transposition is one known method of encrypting the text. What can be one way that a piece of cipher text can be determined quickly if it was likely a result of a transposition? Utilisingsome of the decryption techniques (substitution and others) covered in the subject so far, you are required to decipher (find the plain text) the cipher text that will be proviced to you closer to the assessment due date via the subject site. In order to present your solution, you need to demonstrate and explain the steps taken to decipher this text.

Reference no: EM133042624

Questions Cloud

Risk management and assess IT risk in business terms : Justify the goals and various key terms used in risk management and assess IT risk in business terms - summary of the impact or consequence
What amount would you use for the cost of switching : If you were using NPV analysis to decide whether the company should switch to the net 30 credit policy, what amount would you use for the cost of switching
How much can be accumulated for retirement : How much can be accumulated for retirement if $2,000 is deposited annually, beginning one year from today, and the account earns 9 percent interest
What amount of dividend will a shareholder who owns : If the preference shares are cumulative and fully participating, what amount of dividend will a shareholder who owns 2,500 ordinary shares receive
Examine malicious activities that may affect the security : Examine malicious activities that may affect the security of a computer program and justify the choice of various controls to mitigate threats
What is the cost of goods sold under FIFO : Peg City Brews uses a perpetual inventory system and has the following beginning inventory, purchases, What is the cost of goods sold under FIFO
Determine suitability for a Cloud Computing delivery model : Compare and evaluate the ability of different cloud computing architectures to meet a set of given business requirements.
Develop a Vision Document : Describe the problem in your own words, and the capabilities and benefits. You need to create a Project Vision Document which contains
What is the equivalent annual saving from the purchase : The opportunity cost of capital is 8%, and the firm's tax rate is 21%. What is the equivalent annual saving from the purchase if Gluon can depreciate 100%

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd