Explain how randy can send a plaintext p to james secretly

Assignment Help Data Structure & Algorithms
Reference no: EM13999854

1. Suppose you have a secure system with three subjects and three objects,with levels as listed below.

Here H dominates L. You wish to implement a Bell and LaPadula model of security for this system. Fill in the access rights (R and/or W) permitted by the model for each subject/object pair in the access matrix below:

(1) Subject: (H, {A}), Object: (L, {A,B})
- Can the subject read the object? Justify your answer

(2) Subject: (H, {A,B}), Object: (L, {A })

- Can the subject read the object? Justify your answer

(3) Subject: (L, {A,B}), Object: (H, {A })
- Can the subject read the object? Justify your answer

(4) Subject: (L, {A,B}), Object: (H, {A })
- Can the subject read the object? Justify your answer

(5) Subject: (H, {A,B,C}), Object: (H, {A,B })
- Can the subject read the object? Justify your answer

(6) Subject: (L, {A,B}), Object: (L, {C})
- Can the subject read the object? Justify your answer

2. Suppose a department has determined that some users have gained unauthorized access to the computing system. Managers fear the intruders might intercept or even modify sensitive data on the system. Cost to reconstruct correct data is expected to be $1,000,000 with 1% likelihood per year.

One approach to addressing this problem is to install a more secure data access control problem. The cost of access control software is $100,000 with 20% effectiveness.

(1) What is the expected annual total costs?

(2) What is the saving?

(3) Answer if it is worthwhile to invest on the access control software. Justify your answer.

3. Suppose the following:

- James' public key = Kj, James' private key = Kj-1
- Randy's public key = Kr, Randy's private key = Kr-1
- Each person's public key is known to others; Each one's private key is only known to the owner

a) Explain how Randy can send a plaintext P to James secretly

b) Explain how James can verify if a plaintext P is sent from Randy

c) Explain how Randy can verify if a plaintext P is sent from James and at the same time P is sent secretly from James to Randy.

4. IONA Corporation has the following class C Internet License: 193.1.1.0. IONA Corp. would like to allow for exactly 32 sub-networks using subnetting.

(193.45.1.0 -> 11110001.00000001.00000001.00000000)
a) How should Iona Corp. divide up the bits in their Class C license to allow for this?

b) How many devices on each subnet would this allow? Justify your answer

c) What would their subnet mask be? Justify your answer

d) What would be the IP address (Subnet ID) of the first useable subnet id?

e) What would be the IP address of the first useable host id on the first usable subnet id?

f) What would be the IP address of the last useable host id on the first useable subnet id?

g) What would be the broadcast address of the first useable subnet id?

5. Summarize one of the following topics within one page:

- Subnet and Subnet mask
- ARP Protocol
- TCP Protocol

Reference no: EM13999854

Questions Cloud

What is the maximum compression of the spring : A 1500-kg car moving at 25m/s hits an initially uncompressed horizontal spring with spring constant of 2.0x10^6 N/m. What is the maximum compression of the spring?
Is the full breadth of the subject addressed : Discuss the changes you would implement as a human resource professional to your current place of employment to make the organization more attractive for potential employees.
Explain the concept of a competitor analysis : Discuss the importance of competitive advantage and why understanding the competition is important. Explain the concept of a competitor analysis
Find the radius of its circular path : A puck goes around its circular path once every 1.42 s. Its speed is 94.7 cm/s. Find the radius of its circular path in cm.
Explain how randy can send a plaintext p to james secretly : IONA Corporation has the following class C Internet License: 193.1.1.0. IONA Corp. would like to allow for exactly 32 sub-networks using subnetting.  (193.45.1.0 -> 11110001.00000001.00000001.00000000). How should Iona Corp. divide up the bits in..
Expected inflation on short term loans : A banker must earn at least a 2.4% return after expected inflation on short term loans. The inflation rate for the past 6 months has average 5.9%. the expected inflation rate for the next 12 months is 6.5% nominal interest rates for short term loans ..
Main rationing mechanism to allocate tickets for the game : The Milwaukee Brewers are playing their archrival the Chicago Cubs. Bleacher tickets for the game were sold out and many fans would have attended if tickets were available. Did the Brewers use the optimum pricing policy? Explain. If not, explain. Wha..
What would you changed in process for future application : What in the process that you went through in this course had worked well, and what would you have changed in the process for future application? Why
Explaining the risks with differing positions : It is expected that all members of the team deliberate on the issue. If there are differing opinions, factor this into your reply to your client by explaining the risks with differing positions.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Use of sequential or relational file

Assume you wish to keep a record of everything you have in your house. You could use a sequential data document to keep track of common items such as 'cloths'.

  Analyzing the use of database in an organization

Examine the use of databases in your company. Include what database applications are used. Conclude through proposing improvements.

  Declare a global array solution

Declare a global array Solution

  Discuss how concurrency control mechanism interacts

Describe, with examples, the types of problem that can occur in a multi-user environment when concurrent access to the database is allowed. Give full details of a mechanism for concurrency control that can be used to ensure that the types of probl..

  Write pseudocode for a procedure random-search

Write pseudocode for a procedure RANDOM-SEARCH to implement the strategy above. Suppose that there is exactly one index i such that A[i] = x. What is the expected number of indices into A that we must pick before we find x and RANDOM-SEARCH termina..

  Calculate the cost of installing fiber optic cable

Write a program that will calculate the cost of installing fiber optic cable at a cost of $0.87 per foot for a company. Your program should display the company name and the total cost

  1 describe the following named usability design principles

1. describe the following named usability design principles and how you applied them in your coursework? consistency

  Determine expected number of collisions use hash function

Assume we use hash function h to hash n distinct keys into the array T of length m. Suppose simple uniform hashing, determine the expected number of collisions?

  Write a c program to find the intersection andor union of

write a c program to find the intersection andor union of two doubly linked lists using recursion. you are not allowed

  Describe how to develop a subroutine

Describe how to develop a subroutine.

  Lines of action- explain how you will use a search tree to

lines of action- explain how you will use a search tree to find the solutionbullabstractbullintroductionbullrelated

  Survey of fault tolerance policy for load balancing scheme o

This paper investigates about fault-tolerance in load balancing schemes in distributed environment. There are some more parameters influencing QOS but our main focus is on fault tolerance and load balancing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd