Discuss the level of anonymity of each level of sanitization

Assignment Help Basic Computer Science
Reference no: EM131310163

Fisch, White, and Pooch [353] define four levels of log sanitization.

a. Simple sanitization, in which all information except the commands issued by an intruder are deleted

b. Information-tracking sanitization, in which sensitive information is entered into a symbol table as it is encountered, a unique identifier is assigned, and whenever that information is encountered it is replaced with the associated identifier

c. Format sanitization, in which compressed or encoded data is transformed into its original form, the original form is sanitized using information-tracking sanitization, and the resulting data is returned to its transformed format

d. Comprehensive sanitization, in which all data is analyzed and sanitized as in information-tracking and format sanitization
Discuss the level of anonymity of each level of sanitization. Which level could be automated, and to what degree would human oversight be required?

Reference no: EM131310163

Questions Cloud

Name two other axes that would be of interest to an analyst : In the NRL classification scheme for the "time of introduction" axis, must the development phase precede the maintenance and operation phases, and must the maintenance phase precede the operation phase? Justify your answer.
Convertible bond is currently selling : A bond with a coupon rate of 6.5%, maturing in 10 years at a value of $1,000 and current market price of $695 will have a current yield of. A convertible bond is currently selling for $1,125. It is convertible into 20 shares of common which presently..
Stock typically issued by publicly traded organizations : What are the key types of stock typically issued by publicly traded organizations? If you were to invest $10,000 of your own funds, which type would you choose, why? What are junk bonds and would you recommend investing in them? Defend your answer. I..
Develop policies that are compliant with employment laws : Choose three (3) employment tests (e.g., drug tests, medical examinations, HIV tests, generic tests, polygraphs, honesty tests, psychological tests, intelligence and skills tests, and physical fitness, etc.) that the HR Department should use. Just..
Discuss the level of anonymity of each level of sanitization : Comprehensive sanitization, in which all data is analyzed and sanitized as in information-tracking and format sanitizationDiscuss the level of anonymity of each level of sanitization. Which level could be automated, and to what degree would human o..
What you believe are the essential elements of an acceptable : Give your opinion on what you believe are the essential elements of an acceptable use policy for remote access. Elaborate on each item and justify its importance.
Make list of all monetary benefits that will be experienced : Make a list of all monetary benefits that will be experienced upon implementation and thereafter. These benefits include direct profits from products and/or services, increased contributions from investors, decreased production costs due to improv..
Derive logging and auditing requirements : Prove or disprove that state-based logging and transition-based logging are equivalent if and only if the state of the system at the first transition is recorded.
Write gui program in java to implement linked list to store : Write a GUI program in Java to implement linked list to store a database of students. Store the student's first and last name, ID number, major, and GPA.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd