Explain what is done to prevent wayward system administrator

Assignment Help Basic Computer Science
Reference no: EM1370874

1. What can be done to prevent wayward system administrators from simply looking up user passwords in a host machine password file?

2. You have been hired to provide advice about the use of cryptography to the developer of new two products within a company.

a. Group A is developing a product which will encrypt each user's data before storing it on the hard disk, and decrypt it as it is accessed. Confidentially should be preserved. They want to know what encryption algorithms to use, and how it should be used to achieve their goals. What advice would you give this group?

b. Group B is developing a product which will allow users to send encrypted messages to other users around the world. Users typically do not know each other directly, but they should be able to send messages for which integrity and confidentiality are preserved. They want to know what encryption algorithm(s) to use, and how it (they) should be used to achieve the goals. What advice would you give this group?

3. An enterprising group of entrepreneurs is starting a new data storage and retrieval business, StoreItRite, Inc. For a fee, the new company will accept digitalized data (both text and images), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from StoreItRite over the Internet. StoreItRite guarantees that the data's confidentiality and integrity will be maintained.
StoreItRite also envisions some information assurance requirements for their internal operations. Company employees will need to exchange confidential email, and will need a mechanism for verifying the integrity and originator of some email messages. Also, StoreItRite intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data's confidentiality and integrity.

StoreItRite is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy StoreItRite's requirements as stated above. How would a successful candidate respond?

Reference no: EM1370874

Questions Cloud

Show visualization technique applied to business management : Use the technique of visualization in sports seems natural, but how might this technique be used in a business setting among employees and/or supervisors?
Calculate the effective fixed rate : A corporation has a variable-rate loan with a bank paying LIBOR plus 65. The company wants to make a synthetic fixed-rate loan and enters into an interest rate swap paying a swap fixed rate of 9% and receives LIBOR.
What is the average rate at which energy is transmitted : On a workday the average decibel level of a busy street is 69 dB, with 102 cars passing a given point every minute. If the number of cars is condensed to 39 cars every minute on a weekend, what is the decibel level of street.
Equation of marginal revenue : Find out the quantity at which profits are maximal. given that quantity, find out the price charged and monopolist's profits. (solve for answers using the equations)
Explain what is done to prevent wayward system administrator : Explain what can be done to prevent wayward system administrators from simply looking up user passwords in host machine password file?
Question based on financial management : Considering that airlines compete based on routes, flight times, and price; will the Investment Lufstansa is making in its airport lounges, will the Return on that Investment be positive, negative, or neutral?
What is the magnitude of the necessary net force : In Millikan's experiment, an oil drop of radius 1.85 μm and density 0.852 g/cm3 is suspended in chamber C whilst a downward electric field of 0.62 × 10^5 N/C is applied. Find the charge on the drop, in terms of e.
Determine eventual total change in reserve : Suppose a new deposit to the US banking system of $1000. Assume that all commercial banks have a target reserve ratio of 10 percent and there is no cash drain.
How much work is required to eject a positive sodium ion : A 320 kg rocket sled can be accelerated at a constant rate from rest to 1400 km/h in 2.0 s. What is the magnitude of the necessary net force.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Secure windows-unix-linux servers from known shortcoming

The CIO has asked you to explain why you suggest it is so significant to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  Banning in us all forms of cloning a good thing

Is banning in the US all forms of cloning a good thing? Or is this not one of those situations where one size fits all?

  Explain bindings which are required to determine semantics

Write simple assignment statement with one arithmetic operator in some language you know. For each component of statement, write various bindings which are needed to determine semantics.

  Role of systems analysis in success of firms today

What role does systems analysis play in success of firms today? Why? Where would you "place" analysis function to maximize its effectiveness? Support recommendations.

  Explaining actionscript developer

What do you believe the following comment means for ActionScript developer: "you are used to having to define object methods and properties in class structure before using them in instance.

  Facilitate assembly of information for business decisions

This module is about "business intelligence" and tools which facilitate assembly of information/knowledge in ways which enable "better" business decisions to be made.

  Benefits-negative effects brought by workplace automation

Write down at least three benefits and three negative effects brought about by workplace automation.

  Explain dynamic programming approach-longest weighted path

Assume we have a directed acyclic graph G = (V, E) with real-valued edge weights and two distinguished vertices s and t. Explain a dynamic programming approach for ?nding a longest weighted simple path from s to t.

  What is optimal strategy if n is known

Consider the numerical 20 questions game. In this game, player 1 thinks of a number in the range 1 to n. Player 2 What is an optimal strategy if n in known?

  What is big-o complexity of method

Write a method maxVal that accepts as parameter the reference to the head node of a linked list of integers. The method should return the largest value in the list. What is the Big-O complexity of the method maxVal?

  Explaining statement for security policy

Write a statement for security policy for the following:Let LAN for small 100-person business, Pixel Inc. Business occupies one floor in office building. Everybody has a computer on his or her desk.

  Solving problem by permutation on set is a one-to-one

Prove that PERM=POWER P, the obvious algorithm doesn't run in polynomial time as problem size is logarithmic (and no linear) with respect to the value of t.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd