Discuss the level of anonymity of each level of sanitization

Assignment Help Basic Computer Science
Reference no: EM131310163

Fisch, White, and Pooch [353] define four levels of log sanitization.

a. Simple sanitization, in which all information except the commands issued by an intruder are deleted

b. Information-tracking sanitization, in which sensitive information is entered into a symbol table as it is encountered, a unique identifier is assigned, and whenever that information is encountered it is replaced with the associated identifier

c. Format sanitization, in which compressed or encoded data is transformed into its original form, the original form is sanitized using information-tracking sanitization, and the resulting data is returned to its transformed format

d. Comprehensive sanitization, in which all data is analyzed and sanitized as in information-tracking and format sanitization
Discuss the level of anonymity of each level of sanitization. Which level could be automated, and to what degree would human oversight be required?

Reference no: EM131310163

Questions Cloud

Name two other axes that would be of interest to an analyst : In the NRL classification scheme for the "time of introduction" axis, must the development phase precede the maintenance and operation phases, and must the maintenance phase precede the operation phase? Justify your answer.
Convertible bond is currently selling : A bond with a coupon rate of 6.5%, maturing in 10 years at a value of $1,000 and current market price of $695 will have a current yield of. A convertible bond is currently selling for $1,125. It is convertible into 20 shares of common which presently..
Stock typically issued by publicly traded organizations : What are the key types of stock typically issued by publicly traded organizations? If you were to invest $10,000 of your own funds, which type would you choose, why? What are junk bonds and would you recommend investing in them? Defend your answer. I..
Develop policies that are compliant with employment laws : Choose three (3) employment tests (e.g., drug tests, medical examinations, HIV tests, generic tests, polygraphs, honesty tests, psychological tests, intelligence and skills tests, and physical fitness, etc.) that the HR Department should use. Just..
Discuss the level of anonymity of each level of sanitization : Comprehensive sanitization, in which all data is analyzed and sanitized as in information-tracking and format sanitizationDiscuss the level of anonymity of each level of sanitization. Which level could be automated, and to what degree would human o..
What you believe are the essential elements of an acceptable : Give your opinion on what you believe are the essential elements of an acceptable use policy for remote access. Elaborate on each item and justify its importance.
Make list of all monetary benefits that will be experienced : Make a list of all monetary benefits that will be experienced upon implementation and thereafter. These benefits include direct profits from products and/or services, increased contributions from investors, decreased production costs due to improv..
Derive logging and auditing requirements : Prove or disprove that state-based logging and transition-based logging are equivalent if and only if the state of the system at the first transition is recorded.
Write gui program in java to implement linked list to store : Write a GUI program in Java to implement linked list to store a database of students. Store the student's first and last name, ID number, major, and GPA.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Probability p when the line goes idle

Your timeline should meet criterion (i) of the previous problem, but in lieu of criterion (ii), you should show at least one collision and at least one run of four deferrals on an idle line. Again, note that many solutions are possible.

  Mysql database and appears

For my wordpress site I need a page called NRAC Member coded in PHP so that it access information from the MySQL database and appears on a new page. 2. Want the file maker database be connected to MySQL Database

  Construct a minimum-run d-optimal resolution iv design

Construct a minimum-run D-optimal resolution IV design for 12 factors. Find the alias relationships. What approach would you recommend for analyzing the data from this experiment?

  Good relationship names and relationships types

Design and draw an ERD with entity types customer, employee, payment, account, vehicle and expense. use your own discretion and knowledge in database to connect them with good relationship names and relationships types.

  What are four of the major activities that occur

What is one type of start-up activity that is affected by the difference in a project's complexity? Describe the difference in that activity between low-, medium-, and high-complexity projects.

  Should is blank be public protected or private explain

What small change(s) would you make to the classes to ensure that the correct version of isExpression is called?

  The gain or loss for the stock

Write a program to process stock data. The stock data should be read from a text file containing the following data: stock code, stock name, amount invested (XXX.XX), shares held, and current price. Sue the internet or your local paper to gather..

  Examples of inelastic traffic

Provide three examples of inelastic traffic not discussed in the text and validate their inclusion as inelastic. Analyze the characteristics of elastic traffic to determine why this is used on the Internet.

  An adt called squarematrix

An ADT called SquareMatrix

  Write a gui-based program that analyzes a round of golf

Write a GUI-based program that analyzes a round of golf. You will retrieve the data for 18 holes from a text file. On each line in the file will be the par for that hole (3, 4, or 5) and your core for that hole should be displayed in a label. Prov..

  Construct an e-r diagram for a car insurance company

Each payment is for a particular period of time, and has an associated due date, and the date when the payment was received.

  Understanding of storage classes and scope rules

It amounts to a "divide and conquer" approach to problem solving. This needs sound understanding of storage classes and scope rules. Response and or thoughts?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd