Research paper of approximately five

Assignment Help Basic Computer Science
Reference no: EM131260585

Short Research Paper #1 - Sandra and MBT

Prepare a short research paper of approximately five (5) pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end.  Submit the paper in your assignment folder as a Word attachment with the following file name:

YourlastnameMBT.doc

(For example, my submission file would be called MadisonMBT.doc)

If you are unable to virus check your document, please submit as an rtf file rather than as a doc file.  Please do not use macros in your document.

Scenario:

Sandra, a high net worth customer, banks on-line at Megagargantuan Bank and Trust (MBT) and has agreed to use 3DES (also known as Triple DES) in communicating with MBT.  One day, Sandra received a statement showing a debit of $1,000,000 from her account.  On inquiring, she was told that the bank manager, Janet, transferred the money out of Sandra's account and into an account of her own in an offshore bank.  When reached via long distance in the Cayman Islands, Janet produced a message from Sandra, properly encrypted with the agreed upon DES keys, saying: "Thanks for your many years of fine service, Janet.  Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Sandra."

Sandra filed suit against Janet, MBT and the government of the Cayman Islands, claiming that the message was a forgery, sent by Janet herself and asking for triple damages for pain and suffering.  MBT filed a countersuit against Sandra, claiming that all procedures were followed properly and that Sandra is filing a nuisance suit.  You are called in as an expert witness on the cryptographic issues of the case.

Explain to the Court:

What can be determined from the facts as presented about whether Sandra intended to make Janet a gift of $1,000,000.

What is a plausible explanation of what may have happened in this case?

Assuming MBT wishes to continue using 3DES as its cryptographic system, explain what MBT and Sandra could have done to protect against this controversy arising.

Please Note: It is not required in this paper to provide a detailed explanation of the 3DES encryption algorithm.

Reference no: EM131260585

Questions Cloud

What decision is recommended by the expected value criterion : Joseph Biggs owns his own ice cream truck and lives 30 miles from a Florida beach resort.  - Construct Joseph's decision tree.  -  What decision is recommended by the expected value criterion?
Use of business intelligence : Identify 2 specific benefits that the organization receives from its use of business intelligence (BI). Contrast the value of these benefits against the costs of the organization's BI initiatives.
Predict the vertical motion time history of the vehicle : The ground input is the velocity vi(t) Construct a model of this system that, if solved, would predict the vertical motion time history of the vehicle. Since h(t) is very small, it is all right to consider the relative motion between base and skir..
Develop a decision tree for jonatan : Jonatan Jelen is considering opening a bicycle shop in New York City. - The results of such a study could be either favorable or unfavorable. Develop a decision tree for Jonatan.
Research paper of approximately five : Prepare a short research paper of approximately five (5) pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures can be inse..
What is the difference between computer hardware and softwar : What is the difference between computer hardware and software? Why is the use of information systems in health care important? Explain your answer.
Construct a bond graph model of the system : Consider the system from Problem 12-5. Neglect thermal capacitance of the piston walls but include leakage past the piston to the atmosphere. Using one thermodynamic accumulator and one 4-port isentropic nozzle, construct a bond graph model of the..
What should brewerton do to maximize his expected payoff : If he does not exercise this option, then the payoff is $40,000. - What should Brewerton do to maximize his expected payoff?  - What is the value of this expected payoff?
What are the main components of a database : What are the main components of a database? Based on Part A of this assignment, explain how relational data is used? Explain why the use of databases is important in health care.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd