Security goals confidentiality- integrity- digital signature, Computer Networking

Assignment Help:

Question 1  This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not provide integrity.

Question 2  In a particular form of two-factor authentication, a user shows their identity by providing a password and also by providing the current value displayed on a security token. Describe an attack that would be prevented by this two-factor approach, but which would succeed against a system where identification is based just on passwords.

Question 3  A typical password is about 8 characters long (and so can be stored in 8 bytes, or 64 bits). However, a typical key for encryption/decryption is much longer, and a key of 64 bits would not be considered secure. Explain this in terms of the difference between the way a secret is used as a password, and the way it is used as a key. Hint: what happens if an attacker takes a few months to discover the secret?

Question 4  Suppose that Fred Foolish, a colleague of yours, says "I have heard that the security of an operating system is built on the hardware mechanism that separates user mode from kernel mode. This means that an attack that succeeds against one operating system must have broken the hardware mechanism, and therefore the same attack will work against any other operating system on the same type of machine. Thus there can't be any reason to believe that one operating system is more secure than any other." Write a discussion that explains to Fred why his argument is invalid.

Question 5 What are the necessary properties of a digital signature? List the encryptions that would be applied to a block of plaintext to produce a digital signature of that plaintext. For each encryption state whether the encryption is symmetric or asymmetric and, if asymmetric under whose (sender's or receiver's) public or private key the encryption is performed.

 


Related Discussions:- Security goals confidentiality- integrity- digital signature

What are the benefits of networking, What are the benefits of Networking? ...

What are the benefits of Networking? The following are the distinct notes in favor of computer networking. a. The computers, staff and information can be well managed b.

packing -unpacking data with parallel virtual machine , Packing and Unpack...

Packing and Unpacking Data pvm_packs - Pack the active message buffer with arrays of prescribed data type: int info = pvm_packf( const char *fmt, ... ) int info = pv

Explain about traditional modems, Q. Explain about Traditional Modems? ...

Q. Explain about Traditional Modems? - Subsequent to modulation by the modem an analog signal reaches the telephone company switching station where it sampled and digitized to

Modify the tcp server and udp server in client server, Let's imagine that w...

Let's imagine that we have 2 TCP clients. A simple one (modTCPClient.c) like the one you wrote in the first part of project 2 and another one (modTCPClient1.c) that after it connec

Which layer is responsible for coordinating communication , Which layer is ...

Which layer is responsible for coordinating communication between systems Ans) The Session layer performs the following: Responsible for establishing and maintaining connections

use dijkstras shortest-path algorithm compute short path, Consider the fol...

Consider the following network example. With the indicated link costs along each link in the figure, use Dijkstra's shortest-path algorithm to compute the shortest path from x to a

How do we describe the concept of dpu, How do we explain the method of DPU,...

How do we explain the method of DPU, Segments, Datagram, Frame and  packet?

What is traffic shaping, Normal 0 false false false EN-...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd