Explain what is done to prevent wayward system administrator

Assignment Help Basic Computer Science
Reference no: EM1370874

1. What can be done to prevent wayward system administrators from simply looking up user passwords in a host machine password file?

2. You have been hired to provide advice about the use of cryptography to the developer of new two products within a company.

a. Group A is developing a product which will encrypt each user's data before storing it on the hard disk, and decrypt it as it is accessed. Confidentially should be preserved. They want to know what encryption algorithms to use, and how it should be used to achieve their goals. What advice would you give this group?

b. Group B is developing a product which will allow users to send encrypted messages to other users around the world. Users typically do not know each other directly, but they should be able to send messages for which integrity and confidentiality are preserved. They want to know what encryption algorithm(s) to use, and how it (they) should be used to achieve the goals. What advice would you give this group?

3. An enterprising group of entrepreneurs is starting a new data storage and retrieval business, StoreItRite, Inc. For a fee, the new company will accept digitalized data (both text and images), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from StoreItRite over the Internet. StoreItRite guarantees that the data's confidentiality and integrity will be maintained.
StoreItRite also envisions some information assurance requirements for their internal operations. Company employees will need to exchange confidential email, and will need a mechanism for verifying the integrity and originator of some email messages. Also, StoreItRite intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data's confidentiality and integrity.

StoreItRite is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy StoreItRite's requirements as stated above. How would a successful candidate respond?

Reference no: EM1370874

Questions Cloud

Show visualization technique applied to business management : Use the technique of visualization in sports seems natural, but how might this technique be used in a business setting among employees and/or supervisors?
Calculate the effective fixed rate : A corporation has a variable-rate loan with a bank paying LIBOR plus 65. The company wants to make a synthetic fixed-rate loan and enters into an interest rate swap paying a swap fixed rate of 9% and receives LIBOR.
What is the average rate at which energy is transmitted : On a workday the average decibel level of a busy street is 69 dB, with 102 cars passing a given point every minute. If the number of cars is condensed to 39 cars every minute on a weekend, what is the decibel level of street.
Equation of marginal revenue : Find out the quantity at which profits are maximal. given that quantity, find out the price charged and monopolist's profits. (solve for answers using the equations)
Explain what is done to prevent wayward system administrator : Explain what can be done to prevent wayward system administrators from simply looking up user passwords in host machine password file?
Question based on financial management : Considering that airlines compete based on routes, flight times, and price; will the Investment Lufstansa is making in its airport lounges, will the Return on that Investment be positive, negative, or neutral?
What is the magnitude of the necessary net force : In Millikan's experiment, an oil drop of radius 1.85 μm and density 0.852 g/cm3 is suspended in chamber C whilst a downward electric field of 0.62 × 10^5 N/C is applied. Find the charge on the drop, in terms of e.
Determine eventual total change in reserve : Suppose a new deposit to the US banking system of $1000. Assume that all commercial banks have a target reserve ratio of 10 percent and there is no cash drain.
How much work is required to eject a positive sodium ion : A 320 kg rocket sled can be accelerated at a constant rate from rest to 1400 km/h in 2.0 s. What is the magnitude of the necessary net force.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd