What is a plausible explanation of what may have happened

Assignment Help Basic Computer Science
Reference no: EM13754213

Prepare a short research paper of approximately 1300-1500 words, double-spaced, exclusive of cover, title page, and table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be inserted at the appropriate location rather than added at the end. Submit the paper in your assignment folder as a Word attachment with the following file name:

YourlastnameFirstname INFA640 SP1.doc
(For example, my submission file would be PathakDivakerINFA640 SP1.doc)

If you are unable to virus check your document, please submit as an rtf file rather than as a doc file. Please do not use macros in your document.
Be certain that your paper contains the required certification as specified in the syllabus while submitting into LEO
Also submit the paper to Turnitin.com but while submitting toTurnitin.com do not include the certificate, title page, table of content and references. Both submissions are required.

Scenario:

Sandra, a high net worth customer, banks on-line at Megagargantuan Bank and Trust (MBT) and has agreed to use 3DES (also known as Triple DES) in communicating with MBT. One day, Sandra received a statement showing a debit of $1,000,000 from her account. On inquiring, she was told that the bank manager, Janet, transferred the money out of Sandra's account and into an account of her own in an offshore bank. When reached via long distance in the Cayman Islands, Janet produced a message from Sandra, properly encrypted with the agreed upon DES keys, saying: 
"Thanks for your many years of fine service, Janet. Please transfer $1,000,000 from my account to yours as a token of my esteem and appreciation. Signed, Sandra."

Sandra filed suit against Janet, MBT and the government of the Cayman Islands, claiming that the message was a forgery, sent by Janet herself and asking for triple damages for pain and suffering. MBT filed a countersuit against Sandra, claiming that all procedures were followed properly and that Sandra is filing a nuisance suit. 
You have been employed by MBT as a cryptographic expert and consultant to investigate, give recommendations based on your findings including how to proceed with the suit and to produce a report for the MBT Board of Directors, which will provide basis for them in determining how to proceed in this matter.
Your report to the Board of Directors should address but not limited to the following issues:
• From the facts as presented, what can be determined about whether Sandra intended to make Janet a gift of $1,000,000? What are the critical points in determining intention of Sandra? How did the points help you in forming your conclusion about the intention of Sandra?
• What is the significance of Cayman Island? Does it affect your decision?
• Assuming MBT wishes to continue using only 3DES as its cryptographic system, what advice would you give to MBT and the customer or what could MBT and Sandra have done to protect against this controversy arising?
• Would this controversy have arisen if MBT had been using AES rather than 3DES?
• What is a plausible explanation of what may have happened in this case?


Your report should clearly address these issues, with sufficient detail and background to allow the "cryptographically challenged" Board of Directors to understand the issues involved and recommendation to formulate plans for how to approach the immediate issue with Sandra, and to continue business in the future, assuming that they want to continue using 3DES

Assuming MBT wishes to continue using 3DES as its cryptographic system, explain what MBT and Sandra could have done to protect against this controversy arising 

Reference no: EM13754213

Questions Cloud

Evaluate effect of organizational structure and governance : Evaluate the effect of organizational structure and governance, culture, and social responsibility focus on what happened in your chosen situation.
Despite the growing number of security incident : Despite the growing number of security incidents, cybersecurity risks and threatsare still notoriously hard to quantify and estimate.
Driver class called fliprace whose main method created : PP 5.6: Using the Coin class defined in this chapter, design and implement a driver class called FlipRace whose main method created two Coin objects, then continually flips them both to see which coin first comes up heads three flips in a row. Contin..
What are the predominant electronic and physical threats : What are the predominant electronic and physical threats to communications networks?
What is a plausible explanation of what may have happened : Prepare a short research paper of approximately 1300-1500 words, double-spaced, exclusive of cover, title page, and table of contents, endnotes and bibliography. Your paper must use APA formatting with the exception that tables and figures can be ins..
Calculate the wavelength of light : The frequency of strong yellow light in the spectrum of sodium is 5.09.10*14s calculated the wavelength of light
Different types of computer systems : Finally, review different types of computer systems. Make recommendations on the types (you do not need to include brands or specifications) of computers that will help the employees and suppliers better use the system
Installing windows server networking : Installing Windows Server®Networking located on the student website and select one option to complete the assignment. Installing Windows Server Networking
Civil war breaks out in england : Civil war breaks out in England. Cause:' the Roundheads win, and England is declared a commonwealth.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Current design model of it

In the current design model of IT service provision at NSI, the service desk function is provided in-house by TAFE employees. Consider the option of outsourcing the service desk.

  Determines the change to be dispensed from a vending machine

Write a program that determines the change to be dispensed from a vending machine. An item in the machine can cost between 25 cents and a dollar, in 5-cent increments(25,30,35,..90,95,100), and the machine accepts only a single dollar to pay for t..

  Compute the transmission line utiliza

Consider that packets arrive at an internet router from 3 different other routers, each with Poisson arrivals with l = 4 per second. The packets are all transmitted on the same transmission line

  Show how you would read the status of 100 students

Sample input and the results are shown below. Please enter 10 numbers: 10 31 2 73 24 65 6 87 18 9 Your numbers are: 10 9 31 18 2 87 73 6 24 65

  Why an organization prefer one approach over the other

As a system analyst, which would you prefer? Why? Can the two approaches be successfully combined? Explain. In all cases, support your analysis with specific examples from your readings, research, and professional experience (if applicable).

  Incorporate this method into an application

Incorporate this method into an application that inputs a series of pairs of integers (one pair at a time) and determines whether the second value in each pair is a multiple of the first

  Create a web archive file and attach to this assignment

Name your JSP FormPost4 and name the application Week7. Create a Web archive file and attach to this assignment.

  Steps internet explorer go through when we click on web page

Explain in detail all the steps Internet Explorer should go through when you click on a web page and traverse the network created in the previous exercise.

  How components of computer system interact in system

How do components of computer system interact within system? What improvements or additions to system do you believe would benefit you or make system more user-friendly?

  Creating an object-oriented, multiple-file project and class

Overview creating an object-oriented, multiple-file project and class definition involving the use of static data members,

  Write an expression that refers to the first element

Given an ArrayList a , write an expression that refers to the first element of the ArrayList.

  List at least five different pieces of hardware

(1) Identify the hardware you have on your computer and catagorize each piece as input, output, or both. (2) List at least five different pieces of hardware with at least one of each category.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd