Provide data security technologies

Assignment Help Computer Network Security
Reference no: EM131474446 , Length: 5

QUESTION ONE

Viruses, worms, Trojan horses, and hacking are all security issues in our computer network. Each of these malwares or programs attaches and spreads in different ways. Through hacking hackers can infect computers with various types or malware and viruses.

Explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect computers.

"Security warning!

Application cannot be encrypted or Spyware alert! Your computer is infected by spyware.

Do you want to activate your antivirus software now?" Th ese are usually the messages that appear on your computer when it is infected by a virus.

These are the types of viruses and message traps that hackers attempt to use to scam users into buying false antivirus software. Each type of these infectious malwares and programs by hackers are different and occur in various ways.

Viruses and hacking have a major impact on two main topics discussed in Computer Information Technology. Provide Data Security Technologies and elaborate on how each is implemented.

QUESTION TWO

2.1 Discuss how developers should apply the following countermeasures to improve the security of their code:

a) Modularity

b) Coupling

c) Encapsulation

d) Information hiding

e) Mutual suspicion

2.2 If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by e-mail, but sometimes it sends you your old password by e-mail. Compare these two cases in terms of vulnerability of the website owner.

2.3 Explain, with a suitable diagram, what a buffer overflow error is and what the possible results of the occurrence of one are.

QUESTION THREE

3.1 KERBOROS VERSUS PUBLIC KEY INFRASTRUCTURE

3.1.1 What is the trusted third party called in Kerberos? Briefly describe its functions

3.1.2 What is the trusted third party called in PKI? Briefly describe its functions.

3.1.3 Consider a DDOS attack on Kerboros's central server. Which property of security (confidentiality, availability and integrity) has been violated from t he user's perspective? Explain.

3.1.4 Now consider a DDOS attack on a PKI's central server. Which property of security has been violated from the user's perspective? Explain.

3.1.5 Consider a Kerboros system in which the central server has been silently compromised. Which property of security has been violated from the user's perspective? Explain.

3.1.6 Consider a PKI system in which the central server has been silently compromised. Which property of security has been violated from the user's perspective? Explain.

Reference no: EM131474446

Questions Cloud

Good example of social media use by a company : Locate one good example of social media use by a company and one bad example of social media use by a company.
What are basic and nonbasic variables in optimal solution : Solve the model using the simplex algorithm. What are the basic and nonbasic variables in the optimal solution? What are their values?
Define single level of indirect addressing for asc : We have assumed single level of indirect addressing for ASC. What changes are needed to extend this to multiple levels whereby the indirection is performed.
How does dehumanization exist today : How does dehumanization exist today? Give at least three examples.
Provide data security technologies : Explain what viruses are, how it occurs and the types of cybercrimes that can result from it, and how to better protect computers.
Discussion implication of stem cell therapy and neurogenesis : Discussion the implications of stem cell therapy and neurogenesis. What could this mean for patients with nervous tissue injury and all of us as we age?
Does it alter the operation of any of the instructions : Use a 16-bit up-counter as the PC for ASC. What changes are needed for the control unit hardware? Does it alter the operation of any of the instructions?
Discuss the contemporary clinical psychology : Write a paragraph or two discussing the biological, psychological, and social factors involved in your selected case.
Leadership characteristics of effective public : Provide a rationale for how these leadership characteristics support this leadership style.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd