Security goals confidentiality- integrity- digital signature, Computer Networking

Question 1  This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not provide integrity.

Question 2  In a particular form of two-factor authentication, a user shows their identity by providing a password and also by providing the current value displayed on a security token. Describe an attack that would be prevented by this two-factor approach, but which would succeed against a system where identification is based just on passwords.

Question 3  A typical password is about 8 characters long (and so can be stored in 8 bytes, or 64 bits). However, a typical key for encryption/decryption is much longer, and a key of 64 bits would not be considered secure. Explain this in terms of the difference between the way a secret is used as a password, and the way it is used as a key. Hint: what happens if an attacker takes a few months to discover the secret?

Question 4  Suppose that Fred Foolish, a colleague of yours, says "I have heard that the security of an operating system is built on the hardware mechanism that separates user mode from kernel mode. This means that an attack that succeeds against one operating system must have broken the hardware mechanism, and therefore the same attack will work against any other operating system on the same type of machine. Thus there can't be any reason to believe that one operating system is more secure than any other." Write a discussion that explains to Fred why his argument is invalid.

Question 5 What are the necessary properties of a digital signature? List the encryptions that would be applied to a block of plaintext to produce a digital signature of that plaintext. For each encryption state whether the encryption is symmetric or asymmetric and, if asymmetric under whose (sender's or receiver's) public or private key the encryption is performed.

 

Posted Date: 2/16/2013 6:07:23 AM | Location : United States







Related Discussions:- Security goals confidentiality- integrity- digital signature, Assignment Help, Ask Question on Security goals confidentiality- integrity- digital signature, Get Answer, Expert's Help, Security goals confidentiality- integrity- digital signature Discussions

Write discussion on Security goals confidentiality- integrity- digital signature
Your posts are moderated
Related Questions
The application layer This  layer enables users  to access the  network  by providing  a few  services to the user some of the protocols and services available to the  user ar

What are the advantages and disadvantages of the three types of routing tables? The three types of routing tables are fixed, dynamic, and fixed central. The fixed table must be

To use a subnet or classless address, table under routers and hosts that have address must keep two pieces of information with every address: the 32-bit address itself and another

Determine the Objectives of computer security Though computerisation helps a lot in proper organisation of experience, it also opens a Pandora's Box simultaneously. On one


Identify Connectivity Problems  Step 1: Use the ping command to test network connectivity. Use the following table to test the connectivity of every network device.

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which use

QUESTION Write a report to explain the concept of LAN and WAN including the various components of the telecommunication infrastructure required by UTM Ltd. You are required to

Set Cookies 1178345 When  Hussan  browser receives  the HTTP response  message it sees the set cookies header. The  browser then appends  a line to the special cookie file  th

Q. What is Cross over cable? - Cross the critical pair to properly transmit, align and receive signals on devices with like connections. - Pin 1 connected to pin 3 as well a