Security goals confidentiality- integrity- digital signature, Computer Networking

Question 1  This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation which provides the goal of confidentiality but does not provide integrity.

Question 2  In a particular form of two-factor authentication, a user shows their identity by providing a password and also by providing the current value displayed on a security token. Describe an attack that would be prevented by this two-factor approach, but which would succeed against a system where identification is based just on passwords.

Question 3  A typical password is about 8 characters long (and so can be stored in 8 bytes, or 64 bits). However, a typical key for encryption/decryption is much longer, and a key of 64 bits would not be considered secure. Explain this in terms of the difference between the way a secret is used as a password, and the way it is used as a key. Hint: what happens if an attacker takes a few months to discover the secret?

Question 4  Suppose that Fred Foolish, a colleague of yours, says "I have heard that the security of an operating system is built on the hardware mechanism that separates user mode from kernel mode. This means that an attack that succeeds against one operating system must have broken the hardware mechanism, and therefore the same attack will work against any other operating system on the same type of machine. Thus there can't be any reason to believe that one operating system is more secure than any other." Write a discussion that explains to Fred why his argument is invalid.

Question 5 What are the necessary properties of a digital signature? List the encryptions that would be applied to a block of plaintext to produce a digital signature of that plaintext. For each encryption state whether the encryption is symmetric or asymmetric and, if asymmetric under whose (sender's or receiver's) public or private key the encryption is performed.


Posted Date: 2/16/2013 6:07:23 AM | Location : United States

Related Discussions:- Security goals confidentiality- integrity- digital signature, Assignment Help, Ask Question on Security goals confidentiality- integrity- digital signature, Get Answer, Expert's Help, Security goals confidentiality- integrity- digital signature Discussions

Write discussion on Security goals confidentiality- integrity- digital signature
Your posts are moderated
Related Questions
In Windows 2000, a domain describes both an administrative boundary and a security boundary for a collection of objects that are relevant to a particular group of users on a networ

Your Windows client failed to broadcast to all servers that it has accepted an IP address offer. What step is this in the four-step DORA process? a. Discovery b. Offering c. Reques

State in brief about the Local Area Network (LAN) LAN is an interconnection of computers and associated peripherals as well as to the communications system as shown in Figure

where can i find some informations about the subject and the assignment is called Clotilde manufacturing group

Describe at one disadvantage of a peer to peer network. When you are accessing the resources that are shared by one of the workstations on the network, that workstation takes

Hold-Down Timers - Routers ignore network update information for a number of periods.

What are the Data link protocols? Data link protocols are sets of specifications used to implement the data link layer. The categories of Data Link protocols are 1. Asynchro

Determine the term - Backend LAN Backend networks are used to interconnect large systems like mainframes, supercomputers, and mass storage devices. The key needs here is for bu

QUESTION 1. A system analyst has to install a particular type of topology in a textile industry. (a) Describe using diagrams the three most common topologies in terms of nod

BRIDGES:  A bridge is a hardware device also needed to connect two LAN code segments to extend a LAN. A bridge uses two NICs to connect two code segments. It listens to all tr