How does an attack differ from a security risk

Assignment Help Computer Engineering
Reference no: EM131897954

Assignment

PART ONE

• Answer for each question must be 125 words
• APA Format
• 2 sources (1 for each question)

Pick TWO of these questions, restate each selected question, then in the next line, post your viewpoint/answer to it. Make sure you state your reasons or justification to your answer. Make sure also to include at least one reference and properly cite from the reference.

1. During the early computing era between1970s and 1980s, what would be considered a (give examples of each)

o A minicomputer?
o An operating system?

2. What is Client/Server computing? Which is what - give examples?

3. What is the difference between a physical network and a logical network?

4. Compare and contrast: Internet, Intranet, and Extranet.

5. How does an attack differ from a security risk?

6. What is a security control?

7. What is authentication and how does it differ from authorization?

8. What is steganography? How is it used in security technology?

9. Is a single network logon the same as a central system logon?

10. Why would there be a need for remote data access?

11. Discuss some of the corporate vulnerabilities in an organization - not necessarily computer related.

12. Describe the differences between trusted domains and trusting domains.

13. What are some of things you can do to deter intruders away from your computer?

PART TWO

Required Reading:

Traynor, P., McDaniel, P., & La Porta, T. (2008). Security for Telecommunications Networks: Advances in Information Security. Springer ISBN: 0387724419 CHAPTERS 1 AND 2

Answer the below questions. Please complete the questions in a Word document. Use examples from the readings, lecture notes and outside research to support your answers. All questions must answered with viable support and detail. Your answer cannot simply be a cited source answering the question. Please be sure to follow APA guidelines for citing and referencing source

1. What is the difference between active and passive security threats?

2. List and briefly define 3 categories of passive and active security attacks.

3. List and briefly define at least 3 categories of security services.

4. List and briefly define at least 3 categories of security mechanisms.

5. Create a matrix highlighting the relationship between the security services and the mechanisms listed in questions 3 and 4. Place services to the left (vertically), the mechanism to the right (horizontally), then place an X for the applicable mechanisms to the services.

6. What are the essential differences of a symmetric cipher?

7. How many keys are required for two people to communicate via a symmetric cipher?

8. What is triple encryption?

9. List ways in which secret keys can be distributed to two communicating parties.

10. What are the fundamental differences between AES, DES, and 3DES?

• 50 words per question
• APA format
• 1 source minimum per question (source can be used for other questions).

Reference no: EM131897954

Questions Cloud

Explain the effect the ban of free expression had on ideas : Explain the effect the ban of free expression had on ideas at the time. Do you believe such a ban can be done now in this day and age?
Assume production costs are uniformely distributed : Find the probability that costs are between $300 nad $380. In the same time, somebody claims that it is the same as in between $200 and $280.
Draw a context-level data flow diagram for weaver pizza : Draw a context-level data flow diagram for Weaver Pizza.
Evaluate the influence of operations functions : The final project for this course is the creation of a comprehensive case study analysis. Every business-whether a beauty salon, automobile manufacturer.
How does an attack differ from a security risk : How does an attack differ from a security risk? What is authentication and how does it differ from authorization? Why would there a need for remote data access?
Learn about quantitative analysis : Describe the most significant element that you learned about quantitative analysis
What is the lower limit of the interval : We want to find a 95% confidence interval for the true proportion of the population who favor the bill. What is the lower limit of the interval?
What is the present value : What's the present value, when interest rates are 7.5 percent, of a $230 payment made every year forever?
Standard deviation of the sampling distribution : What is the standard deviation of the sampling distribution?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd