Peer entity authentication security service

Assignment Help Computer Network Security
Reference no: EM13651308

Question 1:

Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system. In each case, indicate the degree of importance of the requirement.

Question 2

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Peer entity authentication" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 3

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Data origin authentication" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 4

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Access Control" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 5

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Confidentiality" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 6

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Traffic flow confidentiality" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 7

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Connection-Oriented Data Integrity" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 8

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Non-repudiation" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 9

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Availability" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Verified Expert

Reference no: EM13651308

Questions Cloud

What is the mass of the liquid water that remains : 17.8 grams of liquid water are at 0 degrees celesius and another 17.8 grams are at 100 degrees celsius. What is the mass (in grams) of the liquid water that remains
Calculate the expected time constant : A RC circuit is to be wired for testing using a 33 ohm resistor anda 100 mirco farad capacitor. Calculate the expected time constant
Environment and its underlying resource base : All economic activity is dependent upon that environment and its underlying resource base
Find how far does the coin roll before coming to rest : A coin with a diameter of2.64 cm isdropped onto a horizontal surface. How far does the coin roll before coming to rest
Peer entity authentication security service : Draw a matrix similar to the table presented in class that shows the relationship between security services and attacks - Peer entity authentication security service
Determine what is the coefficient of kinetic friction : At Sea World, a 28.0-kg seal slidesdown a ramp into the pool below. What is the coefficient of kinetic friction between the sealand the ramp
What is the approximate uncertainty in its energy : The subatomic particle called the delta (1232) is an excited stateof the proton, What is the approximate uncertainty in its energy
Determine what is the angular acceleration of the wheel : A wheel rotating with a constantangular acceleration turns through 22 revolutions during a 3 s timeinterval. What is the angular acceleration of the wheel
Calculate how much work does the father do : A father pulls his young daughter on a sled with a constantvelocity on a level surface a distance of 10 \rm{m}, how much work does the father do

Reviews

Write a Review

Computer Network Security Questions & Answers

  Evaluate the importance of the nondisclosure agreement

Evaluate the importance of the Nondisclosure Agreement and other legal agreements to both parties -  Propose the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration t..

  Explaining characteristic of san or a nas configuration

Storage Area Networks (SAN) and Network Attached Storage (NAS) each give high capacity file storage. For the following list, indicate whether the list item is more characteristic of a SAN or a NAS configuration.

  A friend is interested in installing a wireless lan in her

a friend is interested in installing a wireless lan in her small business. she has about a dozen employees. she is

  Hypothetical business engaged in e-business

Provide an executive briefing to middle and upper management on the topic of cryptography and how it should be applied in this environment

  Research the debate over activex controls

Using the Web, research the debate over ActiveX controls and analyze Microsoft's security design. Is it strong enough? What security breaches have occurred in the past regarding ActiveX controls?

  Write a program in to find the largest value of k

Write a program in to find the largest value of k such that there exists a k-core in a given undirected graph G = (V, E). Also print out the nodes in the largest k-core.

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  What might be your three most important concerns

Many hackers claim to believe that "access to computers should be unlimited and total" and that "all information should be free." Do you agree with these statements? Why or why not?

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher. encrypt the

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Different logon passwords to be five upper-case letters

Computer system 1 needs logon passwords to be five upper-case letters. How many different passwords are there for system 1?

  Minimum contacts test

Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd