How should you not report computer crime

Assignment Help Data Structure & Algorithms
Reference no: EM131943895

Part 1

Q1-10 choose best one, Please provide reason of your choice in a few sentences, in your own words and/or reasons not choosing the other choices. Restating the problem in your own words does not constitute as the reason. Sometimes defining the terms may give you a clue to the reason.

1. What piece of legislation allows computer records documenting criminal activity to be used in court?
a. National Infrastructure Protection Act
b. Federal Computer Documents Rule 703(a)
c. Digital Signature Bill
d. Federal Rules of Evidence 803(6)

2. How should you NOT report computer crime?
a. telephone
b. e-mail
c. tell management in person
d. tell the IT department in person

3. What is most often overlooked when planning for information security?
a. firewalls
b. education
c. virus scans
d. electronic surveillance

4. Which of the following are the reason for the difficulties in prosecutions of computer-related crimes?
1. The area of litigation is extremely technical and difficult to understand.
2. Most of the crimes do not fall under any of the current laws
3. The laws themselves are relatively new and untested.
4. The technology is very dynamic, and the tactics of the perpetrators are constantly changing.
a. 1 and 2
b. 1, 2 and 3
c. 1, 2 and 4
d. 1, 3 and 4
Reason:

5. What is not considered the misuse of information?
a. the untimely release of secret information
b. the deletion of information from a system
c. the illegal sale of information to rival companies
d. the misrepresentation of information
Reason:

6. How does a client machine find the web address associated with a particular URL?
e. It uses translation software in the interpreter.
a. It sends a message to the nearest domain name server.
b. It uses hashing to translate the address.
c. It sends a message to the URL server.

Part II Q1-3

QII.1 For a public-key encryption system, list reasons,
1) in favor of
2) and against
for using the same key pair for 1) the encryption and for 2) the digital signature

QII.2 Describe "inference controls"
Give reasons why they are needed.
And give specific examples (at least 3), and
Describe how the inference controls are implemented; how they serve the purpose (effective) in a database.

QII.3 Describe the "crypto dilemma."
Suggest 3 ways to address the "crypto dilemma."
State the pros and cons of each way.

Part 3: Essay Question. Maximum length: 900 words

An enterprising group of entrepreneurs is starting a new data storage and retrieval business, SecureStore, Inc. For a fee, the new company will accept digitalized data (text and images, multimedia), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from SecureStore over the Internet. SecureStore guarantees that the confidentiality and integrity of the datawill be maintained.

SecureStore also envisions certain information assurance requirements for their internal operations. Company employees will need to exchange confidential email and will need a mechanism for verifying the integrity and originator of some email messages. Also, SecureStore intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data's confidentiality and integrity.

SecureStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy Secure Store's requirements as stated above. How would a successful candidate respond?

First, list the requirements gleaned from the above statements; once you have them then please address each requirement in a separate paragraph. Keep in mind that this business will be operating in the real world, which means please pay attention to economics.

Verified Expert

The solution file prepared in ms word which explained about crypto problem with pros and cons, public key, inference control. We explained case study of requirements and also we solved multiple choice questions with reason.

Reference no: EM131943895

Questions Cloud

How you used the knowledge gained in the cryptography : How you used the knowledge gained in the Cryptography and physical security courses and also how you applied the principles in your intern(or at work).
Pace of organizational change : Comment on the types of technology, the pace of technological advancement, and the factors that have affected the pace of organizational change during this time
Write a paper about preferences for car choices in us : Write a paper of around 100 to 200 words about "preferences for car choices in United States"(citations are required)?
Prepare a report that address various system irregularities : In a Microsoft Word document, prepare an 8- to 10-page report that addresses the various system irregularities.
How should you not report computer crime : INFA 640 Cryptography and Data Protection - What piece of legislation allows computer records documenting criminal activity to be used in court
Determining the behavior and learning : When answering the question, be sure to address how an individual in a high-crime vs a low-crime area would learn through operant conditioning.
Discuss the types of psychometric assessments : What types of psychometric assessments (e.g., personality inventories, cognitive assessments, and integrity tests) are best to identify applicants.
Keeping a game window open : Lamont often keeps a game window open when he is doing classwork on his computer so that he can quickly navigate to the game whenever
Evaluate the whole organizations anticipated growth : Evaluate the whole organization's anticipated growth. Compare the growth to the daily job activities of employees in different IT positions within organization

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Why are data analysis skills and thinking so important

Why are data analysis skills and thinking so important to spend analysis. Can't software applications be used to generate the information needed automatically

  Write pseudocode for a procedure random-search

Write pseudocode for a procedure RANDOM-SEARCH to implement the strategy above. Suppose that there is exactly one index i such that A[i] = x. What is the expected number of indices into A that we must pick before we find x and RANDOM-SEARCH termina..

  Compute a shortest-path

Compute a shortest-path from u to v (instead of from u to all the nodes). One way to speed up Dijkstra's algorithm might be to run the algorithm u and from v at the same time.

  Write sql select statement that would re-organize results

Describe an algorithm that you could implement that would allow you to find a given person's telephone number in the shortest amount of time

  How many bits are needed for the opcode

A digital computer has a memory unit with 32 bits per word. The instruction set consists of 128 different operations. All instructions have an operations code part (opcode) and an address part (allowing for only one address). Each instruction is s..

  Write a program that implements kruskals algorithm

Write a program that implements Kruskal's algorithm

  Can you design a hybrid data structure

Arrays are fast at jumping quickly to a given element, whereas linked lists are fast at insertion after a given element.

  Are there any full binary trees on even number of vertices

A binary tree is a full binary tree if each vertex has either two nonempty children or two empty children (a vertex with two empty children is called a leaf.)

  Formula to compute number of address bus conductors

If an address bus needs to be able to address 8-devices, how many conductors will be needed? What if each of those devices also requires to be able to talk back to the I/O control device?

  Let t be the degree of a btree

Let t be the degree of a BTree. Suppose the size of each object, including the key, stored in the tree is 90 bytes. Also, suppose the size of a BTreeNode pointer is 4 bytes.

  Write an algorithm for computing total flight time

Write an algorithm for computing total flight time and the horizontal distance traveled by the cannon ball for the problem discussed in class?

  Algorithm to decide whether there are 2 integers sum equal x

Note that there is no restriction on integers in set P and integer x, that is, we are not restricting ourselves to positive or negative integers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd