What is the threshold value at which buying insurance

Assignment Help Other Engineering
Reference no: EM131812324

Security Engineering Assignment

You should include appropriate referencing and put answers in your own words.

1. The assignment section on Moodle contains a zip file FpMV with some Windows executables and a Fingerprint.png fingerprint image file in it. To answer the questions here you will need to run FpMV. The fingerprint image is taken from one of the NIST Fingerprint databases.

(a) Once you have loaded the fingerprint file you will see a list of minutiae at the bottom.

i. Explain the meaning of the 4 terms: ( , ), Direction, Quality and Type; used to describe each minutiae.

ii. Graph the Quality versus the number of accepted Minutiae. This and the later graph shouldn't be hand drawn.

iii. Fingerprints are described as being in one of five categories: left loop, whirl, right loop, tented arch, arch. Which category do you think this fingerprint belongs to? Justify your answer.

(b) Use some sort of picture editing program to reduce the quality of the fingerprint image enough that the calculations on the modified image are appreciately different from the ones for the original image. Explain how you carry out this transformation and submit the modified image file Fingerprint2. That modified file doesn't have to be png but it does need to load into FpMV so check that software for the compatible formats.

(c) Load your modified image, Fingerprint2, and ...

i. Describe some of the differences between the data for the original file and the data for the modified file.

ii. For this modified file generate a new record of the Quality versus the number of accepted minutiae curve, and add that curve to the earlier graph.

2. Answer the following questions in the context of a library.

(a) List the main types of objects present.

(b) List the groups of subjects present and show how they are related.

(c) State the actions available.

(d) Give a reasonable description of the access control for this system.

(e) Describe a specific human characteristic that might be considered a vulnerability in this system. Explain why it may be considered a vulnerability.

i. Explain how that characteristic may be exploited by an attacker for some specified purpose.

ii. Explain how that characteristic may lead to accidental damage.

3. Consider that I have an asset worth $2000. There are two mutually exclusive possible events.

  • The first occurs with probability 0 ≤ p ≤ 0.5 and would reduce the value of the asset to $1500.
  • The second occurs with probability

(a) What is the threshold value at which buying insurance would be "worthwhile for both parties", as a function of p? Show working.

(b) Graph the insurance value as a function of a probability p.

4. What is the Tragedy of the Commons? How is it relevant to Internet security?

5. At some point it was planned that Starcraft would use the RealId system. Briefly explain what the ReadId system is and state why the plan was abandoned.

6. These questions relate to diversity in redundant systems:

(a) What does diversity mean in the context of redundant systems?

(b) Give a specific example of diversity in an identified system.

(c) Why does diversity in redundant systems matter?

7. Give an example of how context affects the way we interpret information. Don't use something mentioned in the lectures, lecture notes, or in the textbook.

8. Describe how you could use fault injection in the context of plagiarism detection.

9. Consider the payoff/payout table/matrix below and answer the questions that follow after it.

Alice\Bob

B1

B2

B3

B4

A1

2, 3

0, 4

1, 1

3, 3

A2

1, 3

3, 2

2, 6

1, 4

A3

4, 2

4, 4

5, 1

3, 3

A4

4, 1

3, 1

2, 2

2, 0

(a) Assuming Alice is only concerned with her own gain, is there a dominant strategy for Alice? Justify your answer and state the dominant strategy if there is one.

(b) Assuming Bob is only concerned with his own gain, is there a dominant strategy for Bob? Justify your answer and state the dominant strategy if there is one.

(c) Produce a matrix containing the difference between the result for Alice and Bob, so in each case it is the difference of the two entries, so A1B1 would contain -1.

(d) Is there a dominant strategy for Alice or Bob with respect to the difference matrix produce d in the previous part?

10. Consider the following incomplete ALE table and answer the questions that follow after it.

Event

SLE

Annual Incidence

ALE

A

$200,000

0.004

 

B

$30,000

 

$3,000

C

 

200

$4,000

D

 

1000

$50

E

$400

2000

 

F

$16,000

 

$16,000

G

$2,000,000,000

0.00000000005

 

(a) Complete the ALE table.

(b) Assuming we take no action but operate with the above, how much would we expect to lose in 5 years?

(c) Describe three general principles that can be used to determine whether a particular event needs to be dealt with. You need to think what would be appropriate guidelines.

(d) Apply the three general principles from part b. to the completed ALE table to describe what events should be addressed.

Attachment:- Assignment Files.rar

Reference no: EM131812324

Questions Cloud

What is the unit margin : 1. What is the unit margin (contribution) for Product X (in $)? 2. What is Product X's break-even volume?
Define frequentist interpretation of probability : Give an intuitive explanation of why X is not Binomial for p1 6= p2 (its distribution is called a mixture of two Binomials).
Discuss about the crisis intervention models : The National Organization for Victim Assistance (NOVA) is one of the oldest crisis response agencies; it was originally established to aid crime victims.
How the fundamentals concepts of risk management apply : How the fundamentals concepts and principals of Risk Management apply at home, at work, in the community, and at critical infrastructure locations.
What is the threshold value at which buying insurance : CSCI358 Security Engineering Assignment. What is the threshold value at which buying insurance would be "worthwhile for both parties", as a function of p
Production choice under a capacity constraint : Mack DasMesser, CEO of Lloydian Outpatient Surgical, is reviewing the financial results from the most recent fiscal year, trying to decide the profit-maximizing
Summarize the breaches in terms of the damage to businesses : Describe each concentration, and list 3 audit check for each. Summarize the breaches in terms of the damage to the businesses and the specifics of the attacks.
Compute the direct materials cost and the conversion : Compute the direct materials cost and the conversion cost per equivalent unit for the department. Using the weighted-average method, assign
Explain how this global societal issue impacts : Provide a clear and concise thesis statement that includes a solution to the global societal issue.

Reviews

len1812324

1/13/2018 4:59:33 AM

Australian student, need everything as per the guidelines. You should include appropriate referencing and put answers in your own words. Failure to provide references for a question where it is clear references where used will results in a mark of zero for that question. Please submit your report in pdf, along with the Fingerprint2 file for Q1. The report may be processed through Turnitin so direct copying from websites and failure to appropriately reference will be picked up. There is slight change in Q3, will update you soon on it.

len1812324

1/13/2018 4:59:26 AM

You should include appropriate referencing and put answers in your own words. Failure to provide references for a question where it is clear references where used will results in a mark of zero for that question. The deadline for submission is 11:55pm Friday 26th through Moodle.

len1812324

1/13/2018 4:59:20 AM

Notes on submission - Submission is via Moodle. Please submit your report in pdf, along with the Fingerprint2 file for Q1. The report may be processed through Turnitin so direct copying from websites and failure to appropriately reference will be picked up. Late submissions will be marked with a 25% deduction for each day, including days over the weekend. Submissions more than three days late will not be marked, unless an extension has been granted. If you need an extension apply through SOLS, if possible before the assignment deadline.

Write a Review

Other Engineering Questions & Answers

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  Calculate the gasoline savings

How much gasoline do vehicles with the following fuel efficiencies consume in one year? Calculate the gasoline savings, in gallons per year, created by the following two options. Show all your work, and draw boxes around your answers.

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  Application of mechatronics engineering

Write an essay on Application of Mechatronics Engineering

  Growth chracteristics of the organism

To examine the relationship between fermenter design and operating conditions, oxygen transfer capability and microbial growth.

  Block diagram, system performance and responses

Questions based on Block Diagram, System Performance and Responses.

  Explain the difference in a technical performance measure

good understanding of Mil-Std-499 and Mil-Std-499A

  Electrode impedances

How did this procedure affect the signal observed from the electrode and the electrode impedances?

  Write a report on environmental companies

Write a report on environmental companies

  Scanning electron microscopy

Prepare a schematic diagram below of the major parts of the SEM

  Design a pumping and piping system

creating the pumping and piping system to supply cool water to the condenser

  A repulsive potential energy should be a positive one

Using the data provided on the webvista site in the file marked vdw.txt, try to develop a mathematical equation for the vdW potential we discussed in class, U(x), that best fits the data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd