Research paper of approximately five

Assignment Help Basic Computer Science
Reference no: EM131260585

Short Research Paper #1 - Sandra and MBT

Prepare a short research paper of approximately five (5) pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end.  Submit the paper in your assignment folder as a Word attachment with the following file name:

YourlastnameMBT.doc

(For example, my submission file would be called MadisonMBT.doc)

If you are unable to virus check your document, please submit as an rtf file rather than as a doc file.  Please do not use macros in your document.

Scenario:

Sandra, a high net worth customer, banks on-line at Megagargantuan Bank and Trust (MBT) and has agreed to use 3DES (also known as Triple DES) in communicating with MBT.  One day, Sandra received a statement showing a debit of $1,000,000 from her account.  On inquiring, she was told that the bank manager, Janet, transferred the money out of Sandra's account and into an account of her own in an offshore bank.  When reached via long distance in the Cayman Islands, Janet produced a message from Sandra, properly encrypted with the agreed upon DES keys, saying: "Thanks for your many years of fine service, Janet.  Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Sandra."

Sandra filed suit against Janet, MBT and the government of the Cayman Islands, claiming that the message was a forgery, sent by Janet herself and asking for triple damages for pain and suffering.  MBT filed a countersuit against Sandra, claiming that all procedures were followed properly and that Sandra is filing a nuisance suit.  You are called in as an expert witness on the cryptographic issues of the case.

Explain to the Court:

What can be determined from the facts as presented about whether Sandra intended to make Janet a gift of $1,000,000.

What is a plausible explanation of what may have happened in this case?

Assuming MBT wishes to continue using 3DES as its cryptographic system, explain what MBT and Sandra could have done to protect against this controversy arising.

Please Note: It is not required in this paper to provide a detailed explanation of the 3DES encryption algorithm.

Reference no: EM131260585

Questions Cloud

What decision is recommended by the expected value criterion : Joseph Biggs owns his own ice cream truck and lives 30 miles from a Florida beach resort.  - Construct Joseph's decision tree.  -  What decision is recommended by the expected value criterion?
Use of business intelligence : Identify 2 specific benefits that the organization receives from its use of business intelligence (BI). Contrast the value of these benefits against the costs of the organization's BI initiatives.
Predict the vertical motion time history of the vehicle : The ground input is the velocity vi(t) Construct a model of this system that, if solved, would predict the vertical motion time history of the vehicle. Since h(t) is very small, it is all right to consider the relative motion between base and skir..
Develop a decision tree for jonatan : Jonatan Jelen is considering opening a bicycle shop in New York City. - The results of such a study could be either favorable or unfavorable. Develop a decision tree for Jonatan.
Research paper of approximately five : Prepare a short research paper of approximately five (5) pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures can be inse..
What is the difference between computer hardware and softwar : What is the difference between computer hardware and software? Why is the use of information systems in health care important? Explain your answer.
Construct a bond graph model of the system : Consider the system from Problem 12-5. Neglect thermal capacitance of the piston walls but include leakage past the piston to the atmosphere. Using one thermodynamic accumulator and one 4-port isentropic nozzle, construct a bond graph model of the..
What should brewerton do to maximize his expected payoff : If he does not exercise this option, then the payoff is $40,000. - What should Brewerton do to maximize his expected payoff?  - What is the value of this expected payoff?
What are the main components of a database : What are the main components of a database? Based on Part A of this assignment, explain how relational data is used? Explain why the use of databases is important in health care.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Successful implementation efforts

List and define the factors that are important to successful implementation efforts.

  Important part of the software-development process

Developing a data model is an important part of the software-development process. A data model is a representation of the data you are using in your application. For example, all applications require users; therefore, you will develop a user objec..

  Determining the capital gains yield

What would your capital gains yield have been if you had purchased this stock one year ago and then sold the stock today?

  Annual percentage yield for money

What is the annual percentage yield for money that is invested at 4.5% compounded monthly?

  Investigation is being performed on a particular type

Analyze the notion that if an investigation is being performed on a particular type of system (e.g., Windows, Mac, etc.) that it is best for the investigator to have the same type of system for his/her system. Determine whether or not you believe ..

  Implement the any_count () function for counting cards

Implement the any_count () function for counting cards

  An information systems project to increase data security

What issues need to be considered when planning an information systems project to increase data security

  Categorize the efficiency in terms of the variable

Show in milliseconds the amount of time this construct would require to execute if n were 1000 - Consider the following nested loop construct

  Create a windows application that includes four groups

Create a Windows application that includes four groups of two radio buttons each

  The processes and procedural considerations for implementing

For the purpose of this assignment, you will have to recap your previous assignment (in 250 words) and then provide a well-researched and informed report to the CIO.

  C++ function that receives four double numbers

In addition, write a statement that invokes the calc Average function and assigns its return value to a double variable named quotient. Use the following numbers as the actual arguments: 45.67, 8.35, 125.78, and 99.56.

  Would you like to see different software installed in labs

Would you like to see different software or hardware installed in the computer labs?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd