Explain how randy can send a plaintext p to james secretly

Assignment Help Data Structure & Algorithms
Reference no: EM13999854

1. Suppose you have a secure system with three subjects and three objects,with levels as listed below.

Here H dominates L. You wish to implement a Bell and LaPadula model of security for this system. Fill in the access rights (R and/or W) permitted by the model for each subject/object pair in the access matrix below:

(1) Subject: (H, {A}), Object: (L, {A,B})
- Can the subject read the object? Justify your answer

(2) Subject: (H, {A,B}), Object: (L, {A })

- Can the subject read the object? Justify your answer

(3) Subject: (L, {A,B}), Object: (H, {A })
- Can the subject read the object? Justify your answer

(4) Subject: (L, {A,B}), Object: (H, {A })
- Can the subject read the object? Justify your answer

(5) Subject: (H, {A,B,C}), Object: (H, {A,B })
- Can the subject read the object? Justify your answer

(6) Subject: (L, {A,B}), Object: (L, {C})
- Can the subject read the object? Justify your answer

2. Suppose a department has determined that some users have gained unauthorized access to the computing system. Managers fear the intruders might intercept or even modify sensitive data on the system. Cost to reconstruct correct data is expected to be $1,000,000 with 1% likelihood per year.

One approach to addressing this problem is to install a more secure data access control problem. The cost of access control software is $100,000 with 20% effectiveness.

(1) What is the expected annual total costs?

(2) What is the saving?

(3) Answer if it is worthwhile to invest on the access control software. Justify your answer.

3. Suppose the following:

- James' public key = Kj, James' private key = Kj-1
- Randy's public key = Kr, Randy's private key = Kr-1
- Each person's public key is known to others; Each one's private key is only known to the owner

a) Explain how Randy can send a plaintext P to James secretly

b) Explain how James can verify if a plaintext P is sent from Randy

c) Explain how Randy can verify if a plaintext P is sent from James and at the same time P is sent secretly from James to Randy.

4. IONA Corporation has the following class C Internet License: 193.1.1.0. IONA Corp. would like to allow for exactly 32 sub-networks using subnetting.

(193.45.1.0 -> 11110001.00000001.00000001.00000000)
a) How should Iona Corp. divide up the bits in their Class C license to allow for this?

b) How many devices on each subnet would this allow? Justify your answer

c) What would their subnet mask be? Justify your answer

d) What would be the IP address (Subnet ID) of the first useable subnet id?

e) What would be the IP address of the first useable host id on the first usable subnet id?

f) What would be the IP address of the last useable host id on the first useable subnet id?

g) What would be the broadcast address of the first useable subnet id?

5. Summarize one of the following topics within one page:

- Subnet and Subnet mask
- ARP Protocol
- TCP Protocol

Reference no: EM13999854

Questions Cloud

What is the maximum compression of the spring : A 1500-kg car moving at 25m/s hits an initially uncompressed horizontal spring with spring constant of 2.0x10^6 N/m. What is the maximum compression of the spring?
Is the full breadth of the subject addressed : Discuss the changes you would implement as a human resource professional to your current place of employment to make the organization more attractive for potential employees.
Explain the concept of a competitor analysis : Discuss the importance of competitive advantage and why understanding the competition is important. Explain the concept of a competitor analysis
Find the radius of its circular path : A puck goes around its circular path once every 1.42 s. Its speed is 94.7 cm/s. Find the radius of its circular path in cm.
Explain how randy can send a plaintext p to james secretly : IONA Corporation has the following class C Internet License: 193.1.1.0. IONA Corp. would like to allow for exactly 32 sub-networks using subnetting.  (193.45.1.0 -> 11110001.00000001.00000001.00000000). How should Iona Corp. divide up the bits in..
Expected inflation on short term loans : A banker must earn at least a 2.4% return after expected inflation on short term loans. The inflation rate for the past 6 months has average 5.9%. the expected inflation rate for the next 12 months is 6.5% nominal interest rates for short term loans ..
Main rationing mechanism to allocate tickets for the game : The Milwaukee Brewers are playing their archrival the Chicago Cubs. Bleacher tickets for the game were sold out and many fans would have attended if tickets were available. Did the Brewers use the optimum pricing policy? Explain. If not, explain. Wha..
What would you changed in process for future application : What in the process that you went through in this course had worked well, and what would you have changed in the process for future application? Why
Explaining the risks with differing positions : It is expected that all members of the team deliberate on the issue. If there are differing opinions, factor this into your reply to your client by explaining the risks with differing positions.

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Implement an open hash table

In this programming assignment you will implement an open hash table and compare the performance of four hash functions using various prime table sizes.

  Use a search tree to find the solution

Explain how will use a search tree to find the solution.

  How to access virtualised applications through unicore

How to access virtualised applications through UNICORE

  Recursive tree algorithms

Write a recursive function to determine if a binary tree is a binary search tree.

  Determine the mean salary as well as the number of salaries

Determine the mean salary as well as the number of salaries.

  Currency conversion development

Currency Conversion Development

  Cloud computing assignment

WSDL service that receives a request for a stock market quote and returns the quote

  Design a gui and implement tic tac toe game in java

Design a GUI and implement Tic Tac Toe game in java

  Recursive implementation of euclids algorithm

Write a recursive implementation of Euclid's algorithm for finding the greatest common divisor (GCD) of two integers

  Data structures for a single algorithm

Data structures for a single algorithm

  Write the selection sort algorithm

Write the selection sort algorithm

  Design of sample and hold amplifiers for 100 msps by using n

The report is divided into four main parts. The introduction about sample, hold amplifier and design, bootstrap switch design followed by simulation results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd