Explain what is done to prevent wayward system administrator

Assignment Help Basic Computer Science
Reference no: EM1370874

1. What can be done to prevent wayward system administrators from simply looking up user passwords in a host machine password file?

2. You have been hired to provide advice about the use of cryptography to the developer of new two products within a company.

a. Group A is developing a product which will encrypt each user's data before storing it on the hard disk, and decrypt it as it is accessed. Confidentially should be preserved. They want to know what encryption algorithms to use, and how it should be used to achieve their goals. What advice would you give this group?

b. Group B is developing a product which will allow users to send encrypted messages to other users around the world. Users typically do not know each other directly, but they should be able to send messages for which integrity and confidentiality are preserved. They want to know what encryption algorithm(s) to use, and how it (they) should be used to achieve the goals. What advice would you give this group?

3. An enterprising group of entrepreneurs is starting a new data storage and retrieval business, StoreItRite, Inc. For a fee, the new company will accept digitalized data (both text and images), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from StoreItRite over the Internet. StoreItRite guarantees that the data's confidentiality and integrity will be maintained.
StoreItRite also envisions some information assurance requirements for their internal operations. Company employees will need to exchange confidential email, and will need a mechanism for verifying the integrity and originator of some email messages. Also, StoreItRite intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data's confidentiality and integrity.

StoreItRite is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy StoreItRite's requirements as stated above. How would a successful candidate respond?

Reference no: EM1370874

Questions Cloud

Show visualization technique applied to business management : Use the technique of visualization in sports seems natural, but how might this technique be used in a business setting among employees and/or supervisors?
Calculate the effective fixed rate : A corporation has a variable-rate loan with a bank paying LIBOR plus 65. The company wants to make a synthetic fixed-rate loan and enters into an interest rate swap paying a swap fixed rate of 9% and receives LIBOR.
What is the average rate at which energy is transmitted : On a workday the average decibel level of a busy street is 69 dB, with 102 cars passing a given point every minute. If the number of cars is condensed to 39 cars every minute on a weekend, what is the decibel level of street.
Equation of marginal revenue : Find out the quantity at which profits are maximal. given that quantity, find out the price charged and monopolist's profits. (solve for answers using the equations)
Explain what is done to prevent wayward system administrator : Explain what can be done to prevent wayward system administrators from simply looking up user passwords in host machine password file?
Question based on financial management : Considering that airlines compete based on routes, flight times, and price; will the Investment Lufstansa is making in its airport lounges, will the Return on that Investment be positive, negative, or neutral?
What is the magnitude of the necessary net force : In Millikan's experiment, an oil drop of radius 1.85 μm and density 0.852 g/cm3 is suspended in chamber C whilst a downward electric field of 0.62 × 10^5 N/C is applied. Find the charge on the drop, in terms of e.
Determine eventual total change in reserve : Suppose a new deposit to the US banking system of $1000. Assume that all commercial banks have a target reserve ratio of 10 percent and there is no cash drain.
How much work is required to eject a positive sodium ion : A 320 kg rocket sled can be accelerated at a constant rate from rest to 1400 km/h in 2.0 s. What is the magnitude of the necessary net force.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  What is capacity with two shifts

Given the following data for Albert's fabricating production area:Fixed costs for one shift = $60,000. What is the capacity with two shifts? The additional fixed cost for a second shift is $40,000.

  Monitoring performance of it acquisition projects

Who is or should be responsible for monitoring the performance of IT acquisition projects and taking action that may result in cancelling the project?

  Describing fields and options with user account set-up

Describe the fields and options associated with user account set-up.

  Finding content of ac and memory word at specified address

What are the content of the AC and the memory word at address 103 when the computer halts.

  Effective method to find attack on computer network

Find the most effective method to find out if attack has been made on computer network?

  Subsets of integers which sum to the same number

How many numbers do you require from this generator to guarantee that there exist 2 subsets of integers which  sum to the same number? Write steps how derive the solution.

  Explaining dns zone in secure dynamic updates

If a DNS zone accepts only secure dynamic updates and the DHCP server is a member of the DnsUpdateProxy security group.

  Information technology support company-s business processes

How can information Technology support a company's business processes and decision making and give it competitive advantage? Give examples to illustrate your answer.

  Explain how rsa algorithm works

Use the example to illustrate how RSA algorithm works. Deciper following ciphertext, that was enciphered using Caesar cipher.

  Design patterns in today-s development environments

In System Analysis and Design: Design Patterns - How widely used are design patterns in today's development environments?

  Security by implementing database auditing

You are a DBA for corporation's databases. The management has decided to increase security by applying database auditing yet they are unspecific what actions to audit.

  Deriving logging information for chinese wall model

In the example of deriving required logging information for the Chinese Wall model, it is stated that the time must be logged.Why? Explain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd