Provide data security technologies

Assignment Help Computer Network Security
Reference no: EM131474446 , Length: 5

QUESTION ONE

Viruses, worms, Trojan horses, and hacking are all security issues in our computer network. Each of these malwares or programs attaches and spreads in different ways. Through hacking hackers can infect computers with various types or malware and viruses.

Explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect computers.

"Security warning!

Application cannot be encrypted or Spyware alert! Your computer is infected by spyware.

Do you want to activate your antivirus software now?" Th ese are usually the messages that appear on your computer when it is infected by a virus.

These are the types of viruses and message traps that hackers attempt to use to scam users into buying false antivirus software. Each type of these infectious malwares and programs by hackers are different and occur in various ways.

Viruses and hacking have a major impact on two main topics discussed in Computer Information Technology. Provide Data Security Technologies and elaborate on how each is implemented.

QUESTION TWO

2.1 Discuss how developers should apply the following countermeasures to improve the security of their code:

a) Modularity

b) Coupling

c) Encapsulation

d) Information hiding

e) Mutual suspicion

2.2 If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by e-mail, but sometimes it sends you your old password by e-mail. Compare these two cases in terms of vulnerability of the website owner.

2.3 Explain, with a suitable diagram, what a buffer overflow error is and what the possible results of the occurrence of one are.

QUESTION THREE

3.1 KERBOROS VERSUS PUBLIC KEY INFRASTRUCTURE

3.1.1 What is the trusted third party called in Kerberos? Briefly describe its functions

3.1.2 What is the trusted third party called in PKI? Briefly describe its functions.

3.1.3 Consider a DDOS attack on Kerboros's central server. Which property of security (confidentiality, availability and integrity) has been violated from t he user's perspective? Explain.

3.1.4 Now consider a DDOS attack on a PKI's central server. Which property of security has been violated from the user's perspective? Explain.

3.1.5 Consider a Kerboros system in which the central server has been silently compromised. Which property of security has been violated from the user's perspective? Explain.

3.1.6 Consider a PKI system in which the central server has been silently compromised. Which property of security has been violated from the user's perspective? Explain.

Reference no: EM131474446

Questions Cloud

Good example of social media use by a company : Locate one good example of social media use by a company and one bad example of social media use by a company.
What are basic and nonbasic variables in optimal solution : Solve the model using the simplex algorithm. What are the basic and nonbasic variables in the optimal solution? What are their values?
Define single level of indirect addressing for asc : We have assumed single level of indirect addressing for ASC. What changes are needed to extend this to multiple levels whereby the indirection is performed.
How does dehumanization exist today : How does dehumanization exist today? Give at least three examples.
Provide data security technologies : Explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect computers.
Discussion implication of stem cell therapy and neurogenesis : Discussion the implications of stem cell therapy and neurogenesis. What could this mean for patients with nervous tissue injury and all of us as we age?
Does it alter the operation of any of the instructions : Use a 16-bit up-counter as the PC for ASC. What changes are needed for the control unit hardware? Does it alter the operation of any of the instructions?
Discuss the contemporary clinical psychology : Write a paragraph or two discussing the biological, psychological, and social factors involved in your selected case.
Leadership characteristics of effective public : Provide a rationale for how these leadership characteristics support this leadership style.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the decryption function and the decryptedrecovered

1 using the english alphabet i.e. mod 26 arithmetic let plaintext p1 p2... pn and corresponding ciphertext c1 c2...

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  Demonstrate the use of hash tools to test integrity

Assignment is to give you hands­on experience in generating and using symmetric and public/private keys. Additionally, you will configure a web server to use SSL/TLS, and, using tcpdump, verify its effect in encrypting traffic.

  Provide a disaster recovery plan to prevent a small company

Provide a short Disaster Recovery Plan (DRP) to prevent a small company's IT operation. Make a list of procedures to complete in preparation of the DRP. You may use fictitious examples to support your arguments.

  Implement organization-wide governance and privacy program

Implement an organization-wide Governance and Privacy Program to ensure compliance with applicable laws and regulations in regards to all matters of handling PII.

  What is the value of the symmetric key

In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same?

  Trusted computer system evaluation criteria

How well did the Common Criteria (CC) address these four problems of TCSEC - relevance and correctness of content, clarity and logical flow, spelling, grammar, and proper citations/bibliography.

  Describe why important to secure windows-unix from servers

Describe why you recommend it is so important to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  A web session can be protected against the eavesdroping

Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016.

  Identify the key features of the affordable care act

Identify the key features of the Affordable Care Act

  Single selector signal

The 2 to 1 multiplexer has two inputs (X1 and X2), and a single selector signal (S). All three switches (S1, S2, and S3) are set as toggle switches.

  The six principles of nclb

The six principles of NCLB

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd