Security goals confidentiality- integrity- digital signature, Computer Networking

Assignment Help:

Question 1  This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not provide integrity.

Question 2  In a particular form of two-factor authentication, a user shows their identity by providing a password and also by providing the current value displayed on a security token. Describe an attack that would be prevented by this two-factor approach, but which would succeed against a system where identification is based just on passwords.

Question 3  A typical password is about 8 characters long (and so can be stored in 8 bytes, or 64 bits). However, a typical key for encryption/decryption is much longer, and a key of 64 bits would not be considered secure. Explain this in terms of the difference between the way a secret is used as a password, and the way it is used as a key. Hint: what happens if an attacker takes a few months to discover the secret?

Question 4  Suppose that Fred Foolish, a colleague of yours, says "I have heard that the security of an operating system is built on the hardware mechanism that separates user mode from kernel mode. This means that an attack that succeeds against one operating system must have broken the hardware mechanism, and therefore the same attack will work against any other operating system on the same type of machine. Thus there can't be any reason to believe that one operating system is more secure than any other." Write a discussion that explains to Fred why his argument is invalid.

Question 5 What are the necessary properties of a digital signature? List the encryptions that would be applied to a block of plaintext to produce a digital signature of that plaintext. For each encryption state whether the encryption is symmetric or asymmetric and, if asymmetric under whose (sender's or receiver's) public or private key the encryption is performed.

 


Related Discussions:- Security goals confidentiality- integrity- digital signature

Issues to process of message passing, The following issues are decided by t...

The following issues are decided by the system in the process of message passing: 1) Whether the communication link is established or not 2) Whether the receiver is ready to

Explain about gigabit ethernet, Gigabit Ethernet Data rate of 1000 ...

Gigabit Ethernet Data rate of 1000 Mbps or else 1 Gbps Typically implemented as full-duplex with no CSMA/CD 1000Base-X utilizes long-wave optical fiber (1000Base-

What is sliding window, What is Sliding Window? The sliding window is a...

What is Sliding Window? The sliding window is an abstract method that explains the range of sequence numbers that is the concern of the sender and receiver. In other words, he

Tcp connection management , TCP Connection Management TCP connection ...

TCP Connection Management TCP connection management encompasses the procedures for establishing and  terminating connection (FTCP is  connection oriented protocols). In TCP c

Objectives of performance evaluations, OBJECTIVES After studying this ...

OBJECTIVES After studying this part, you should be able to: Explain the Metrics for Performance Evaluation; Notify about various Parallel System Overheads; Desc

Explain the process of piggybacking, Q. Explain the process of piggybacking...

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

Method of ip multicasting or multicast ip address, Can you describe the con...

Can you describe the concept of IP multicasting or multicast IP address?

Concept of permutation network, Concept Of Permutation Network In permu...

Concept Of Permutation Network In permutation interconnection networks the information replace requires data transfer from input set of nodes to output set of nodes and likely

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd