What sorts of protection is provided by the bank

Assignment Help Computer Network Security
Reference no: EM13838111

Part A: Answer the following questions :

1. Reports of computer security failures appear frequently in the daily news. Research and summarise the article that exemplifies one (or more) of the principles: easiest penetration, adequate protection, effectiveness, weakest link. Ensure the link and full reference is included.

2. Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

3. An electronic mail system could be used to leak information. First, explain how the leakage could occur. Then, identify controls that could be applied to detect or prevent the leakage. Justify your answer based on literature.

4. A computer system provides protection using the Bell-La Padula policy. How would a virus spread if:

• the virus were placed on the system at system low (the compartment that all other compartments dominate)?

• the virus were placed on the system at system high (the compartment that dominates all other compartments)?

Part B:

Task 1. Go to a web site where you do regular banking. Visit this website carefully and answer the following questions:

a. How do you know that the information you type in is secure from phishing?

b. What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

Task 2. Consider a PIN card entry to a secure area for a publishing company that prints confidential documents for other companies such as exam papers for universities and health record for customers. Suggest some examples of confidentiality, integrity and availability in such a scenario. Summarize the requirements as well as the degree of importance for each item associated with such a system with your recommendation in a brief (250-500) words report. Must follow APA style referencing.

Task 3. Mr. Bob is accessing his personal bank account (through a web browser) using an Internet Café. Mr. Bob has opened a text editor simultaneously along with web browser. Suddenly Mr. Bob suspected that the Café computers are infected with malware called 'software keyloggers'.

As a security expert, you need to describe a scheme that allows Mr. Bob to type his userID and Password that the malware (i.e. keylogger), used in isolation of any screen captures or mouse event captures, would not be able to discover Mr. Bob's userID and password.

Reference no: EM13838111

Questions Cloud

Demonstrates mastery in the rhetorical technique : Write thoughtfully with thorough detail and supporting examples to substantiate the claims you state. Write with purpose and direction that demonstrates mastery in the rhetorical technique of argument
What is the communication climate like in your organization : To what degree does your company use technology? Website? Sell products on it? What is the communication climate like in your organization
Can apple justify their behaviour : Can Apple justify their behaviour? Use the shareholder and stakeholder theories of corporate social responsibility to evaluate Apples behaviour and frame your answer.
What issues should be considered in drafting code of conduct : Within the Discussion Board area, write 600-800 words that respond to the following questions with your thoughts, ideas, and comments. Why is it important for a company to have a written code of conduct? What issues should be considered in drafting ..
What sorts of protection is provided by the bank : What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.
Which side of health triangle corresponds to getting enough : Which side of the health triangle corresponds to getting enough rest?
What transferable skills do you have : Examine the critical skills and competencies required to achieve success. What transferable skills do you have and how can these skills be leveraged if you decide to take a different career or life path? How can your professional experience help you ..
Build model for predicting survival of passengers on titanic : Build a model for predicting the survival of passengers on the Titanic using a decision tree in RapidMiner using the two data sets, titanic3_train.csv and titanic3_score.csv.
Discuss the staffing needs of your organization : Discuss the staffing needs of your organization. Thoughtfully discuss each listed item (two to three fully developed sentences per item)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Web-based interface running on another server

Car Rental USA hired you as a consultant. They are building an in-house application system that will pull data from a database located on one server, and display it via a Web-based interface running on another server. What are security issues t..

  Assignment on cryptographic systems

The Week 10 Critical Thinking assignment continues with the scenario set up for the Critical Thinking assignment in Week 8. You have been hired as the chief officer of information technology at a retail store in Medina City. The store has 5000 cus..

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  Discuss how this and other information security

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  Packet filtering firewall and stateful inspection firewall

What is the difference between a packet filtering firewall and a stateful inspection firewall? 12.6 What is an application-level gateway?

  Identify url of the website and your assigned business model

Identify the URL of the website and your assigned business model/category in the first part of the report. Describe the website structure and the purpose of each element (include snapshots and diagrams where appropriate).

  Consider the following authentication protocol

Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)

  Disadvantages of your remote access solution

Describe the advantages and disadvantages of your remote access solution. Describe the network protocols that will be used on your suggested network.

  Assignment on network security

the selection of a virtual private network (VPN) for a midsize network.You shall actually identify the hardware and software needed to meet the network security and users requirements.

  Assignment on email harassment

Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporate Exchange email sys..

  Describe a process that would allow alice to send a message

Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd