Reference no: EM133242285
Question 1. Explain the "Method-Opportunity-Motive" analysis of malicious attackers to computer systems.
Question 2. Discuss the three bases of authentication.
Question 3. Set up a simple scheme that uses authentication based upon things that the user knows to allow them to access their bank account online.
Question 4. What are the advantages and disadvantages of requiring a user to employ at least one symbol (e.g., ! or %) in their passcode?
Question 5. Explain the advantages and disadvantages of using biometrics for user authentication.
Question 6. Discuss the meaning and purposes of cryptography.
Question 7. What is the role of algorithms in cryptography?
Question 8. What is a buffer overflow and what dangers are presented by them?
Question 9. What are the differences among viruses, Trojan horses, and worms?
Question 10. Detail at least one effective malware countermeasure.
Question 11 Explain the role of a browser.
Question 12. What is the role and purpose of a website integrity checksum?
Question 13. Why do legitimate companies send out spam?
Question 14. What is phishing? Why is this dangerous to users?
Question 15. Explain at least two security features usually found in ordinary operating systems.