Explain the meaning the terms granularity

Assignment Help Computer Network Security
Reference no: EM13326350

Answer the following questions :

1. List the three fundamental security properties and for each give an example of failure. Justify your answer based on literature.

2. Reports of computer security failures appear frequently in the daily news. Research and summarise the article that exemplifies one (or more) of the principles: easiest penetration, adequate protection, effectiveness, weakest link. Ensure the link and full reference is included.

3. Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

4. An electronic mail system could be used to leak information. First, explain how the leakage could occur. Then, identify controls that could be applied to detect or prevent the leakage. Justify your answer based on literature.

5. A computer system provides protection using the Bell-La Padula policy. How would a virus spread if:
• the virus were placed on the system at system low (the compartment that all other compartments dominate)?
• the virus were placed on the system at system high (the compartment that dominates all other compartments)?

6. In reference to access control explain the meaning the terms "granularity". Discuss the trade-off between granularity and efficiency.

Reference no: EM13326350

Questions Cloud

Unstable relationship as individual members : A cartel is often an unstable relationship as individual members both seek and seize the opportunity to cheat on the agreement and improve their own position at the expense of others.
How far abovethe top of this window is the roof : A roof tile falls from rest from the top of a building. How far abovethe top of this window is the roof
What sorts of protection is provided by the bank : What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.
What has greater magnitude the force applied by you : A 10 kg box is on a slippery ramp, What has greater magnitude, the force applied by you or the gravitational force
Explain the meaning the terms granularity : In reference to access control explain the meaning the terms "granularity". Discuss the trade-off between granularity and efficiency.
Find the magnitude of initial acceleration of each electron : Three electrons are located at the vertices of an equilateral triangle, one at each vertex. What is the magnitude of the initial acceleration of each electron
List the three fundamental security properties : What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.
What is the magnitude of the apparent weight of a astronaut : What is the magnitude of the apparent weight of a 68kg astronaut 2600km from the center of the Earth's Moon in a space vehicle accelerating toward the Moon at 2.1m/s2
Calculate how far is the planet from the sun : A planet orbits the sun with a period of 8 years. How far is the planet from the sun

Reviews

Write a Review

Computer Network Security Questions & Answers

  Question about program consistency

Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?

  Explaining level of cyberphobia in workplace

After completing the Unit reading on the subject, give your sense of the level of cyberphobia in the workplace and your suggestions on dealing with it as an IT manager.

  List the three fundamental security properties

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Cybersecurity research paper

Identifying and explaining how the breach occurred and identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

  Typical network security problem

The topic, may be of your interest, needs to be approved in advance by the course convenor Dr Xin-Wen Wu; other than that, there are no restrictions.

  Explain it director and staff to how to mange complexities

Host the discussion with IT director and staff and let them know what you believe to be most significant of these extra complexities and reasons why you believe them to be difficult to manage.

  Explain about hashing and message authentication codes

Explain the different roles between hashing and message authentication codes (MAC). Can a good hash function serve as a good MAC, and vice versa?

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  Benefits of an information system

Suppose monetary advantages of an information system of $50,000 the 1st year and increasing benefits of $5000a year of the next four years year 1=$50,000;

  Prepare a trouble ticket to record the problem

Prepare a Trouble Ticket to record the problem

  Identify physical security methods and the role

Identify physical security methods and the role they play in a network security plan. Compare and contrast the advantages and disadvantages of the physical security methods you identified.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd