Research paper of approximately five

Assignment Help Basic Computer Science
Reference no: EM131260585

Short Research Paper #1 - Sandra and MBT

Prepare a short research paper of approximately five (5) pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end.  Submit the paper in your assignment folder as a Word attachment with the following file name:

YourlastnameMBT.doc

(For example, my submission file would be called MadisonMBT.doc)

If you are unable to virus check your document, please submit as an rtf file rather than as a doc file.  Please do not use macros in your document.

Scenario:

Sandra, a high net worth customer, banks on-line at Megagargantuan Bank and Trust (MBT) and has agreed to use 3DES (also known as Triple DES) in communicating with MBT.  One day, Sandra received a statement showing a debit of $1,000,000 from her account.  On inquiring, she was told that the bank manager, Janet, transferred the money out of Sandra's account and into an account of her own in an offshore bank.  When reached via long distance in the Cayman Islands, Janet produced a message from Sandra, properly encrypted with the agreed upon DES keys, saying: "Thanks for your many years of fine service, Janet.  Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Sandra."

Sandra filed suit against Janet, MBT and the government of the Cayman Islands, claiming that the message was a forgery, sent by Janet herself and asking for triple damages for pain and suffering.  MBT filed a countersuit against Sandra, claiming that all procedures were followed properly and that Sandra is filing a nuisance suit.  You are called in as an expert witness on the cryptographic issues of the case.

Explain to the Court:

What can be determined from the facts as presented about whether Sandra intended to make Janet a gift of $1,000,000.

What is a plausible explanation of what may have happened in this case?

Assuming MBT wishes to continue using 3DES as its cryptographic system, explain what MBT and Sandra could have done to protect against this controversy arising.

Please Note: It is not required in this paper to provide a detailed explanation of the 3DES encryption algorithm.

Reference no: EM131260585

Questions Cloud

What decision is recommended by the expected value criterion : Joseph Biggs owns his own ice cream truck and lives 30 miles from a Florida beach resort.  - Construct Joseph's decision tree.  -  What decision is recommended by the expected value criterion?
Use of business intelligence : Identify 2 specific benefits that the organization receives from its use of business intelligence (BI). Contrast the value of these benefits against the costs of the organization's BI initiatives.
Predict the vertical motion time history of the vehicle : The ground input is the velocity vi(t) Construct a model of this system that, if solved, would predict the vertical motion time history of the vehicle. Since h(t) is very small, it is all right to consider the relative motion between base and skir..
Develop a decision tree for jonatan : Jonatan Jelen is considering opening a bicycle shop in New York City. - The results of such a study could be either favorable or unfavorable. Develop a decision tree for Jonatan.
Research paper of approximately five : Prepare a short research paper of approximately five (5) pages, double-spaced, exclusive of cover, title page, table of contents, endnotes and bibliography.  Your paper must use APA formatting with the exception that tables and figures can be inse..
What is the difference between computer hardware and softwar : What is the difference between computer hardware and software? Why is the use of information systems in health care important? Explain your answer.
Construct a bond graph model of the system : Consider the system from Problem 12-5. Neglect thermal capacitance of the piston walls but include leakage past the piston to the atmosphere. Using one thermodynamic accumulator and one 4-port isentropic nozzle, construct a bond graph model of the..
What should brewerton do to maximize his expected payoff : If he does not exercise this option, then the payoff is $40,000. - What should Brewerton do to maximize his expected payoff?  - What is the value of this expected payoff?
What are the main components of a database : What are the main components of a database? Based on Part A of this assignment, explain how relational data is used? Explain why the use of databases is important in health care.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How write program contains array double values

How do you write a program that contains an array of 15 double values

  Discuss the tradeoffs of such an approach

Access control list for a file specifies which users can access that file and how. Some researchers have indicated that an attractive alternative would have a user control list, which would specify which files a user could access, and how.

  Explaining reasonable values for items in risk register

Suggest reasonable values for the items in the risk register for this asset and threat, and provide justifications for your choices.

  Explain roles and influences of computers

Topic is "The Global Economy" . You will be writing the term paper replying to the following questions? Explain the roles and influences of computers and communications technology in increase of trans-border economic activity.

  Example of economics and politics being tied together

What is a recent IMF example of economics and politics being tied together?

  Write the code to read the raw training data

Write the code to read the raw training data into the data structure in the first approach described in Section 1.2.

  Outsourcing to difference vendors to handle it-is activities

Discuss the pros and cons of selecting (outsourcing to) three different vendors to handle three different IT/IS activities.

  Explain vulnerability in the system

How would you respond if Goli came to you describing a vulnerability in your system and offering to help fix it--What would incline you to hire her? What would disincline you from doing so?

  Discuss three standard configuration and security

In addition, discuss three standard configuration and security tools each OS provides. Search the web and describe two third-party or open source tools that can help with managing your OS's security configuration. In what ways do these third-party to..

  A senior business analyst with a multinational corporation

a senior business analyst with a multinational corporation

  Impact of tourism development in the precinct

This assignment requires students to evaluate a precinct's ability to meet visitor needs. Key considerations include assessing whether visitor needs are met, identifying challenges and opportunities, and subsequently recommending strategies for en..

  How much effort in tracking down the identity of the hacker

What are your next steps? How much effort would you spend in tracking down the identity of the hacker?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd