What is the tragedy of the commons

Assignment Help Other Engineering
Reference no: EM131809965

Security Engineering Assignment

You should include appropriate referencing and put answers in your own words. Failure to provide references for a question where it is clear references where used will results in a mark of zero for that question.

1. The assignment section on Moodle contains a zip file with some Windows executables and a Fingerprint.png fingerprint image file in it. To answer the questions here you will need to run FpMV. The fingerprint image is taken from one of the NIST Fingerprint databases.

(a) Once you have loaded the fingerprint file you will see a list of minutiae at the bottom.

i. Explain the meaning of the 4 terms: ( , ), Direction, Quality and Type; used to describe each minutiae.

ii. Graph the Quality versus the number of accepted Minutiae. This and the later graph shouldn't be hand drawn.

iii. Fingerprints are described as being in one of five categories: left loop, whirl, right loop, tented arch, arch. Which category do you think this fingerprint belongs to? Justify your answer.

(b) Use some sort of picture editing program to reduce the quality of the fingerprint image enough that the calculations on the modified image are appreciately different from the ones for the original image. Explain how you carry out this transformation and submit the modified image file Fingerprint2. That modified file doesn't have to be png but it does need to load into FpMV so check that software for the compatible formats.

(c) Load your modified image, Fingerprint2, and ...

i. Describe some of the differences between the data for the original file and the data for the modified file.

ii. For this modified file generate a new record of the Quality versus the number of accepted minutiae curve, and add that curve to the earlier graph.

2. Answer the following questions in the context of a library.

(a) List the main types of objects present.

(b) List the groups of subjects present and show how they are related.

(c) State the actions available.

(d) Give a reasonable description of the access control for this system.

(e) Describe a specific human characteristic that might be considered a vulnerability in this system. Explain why it may be considered a vulnerability.

i. Explain how that characteristic may be exploited by an attacker for some specified purpose.

ii. Explain how that characteristic may lead to accidental damage.

3. Consider that I have an asset worth $2000. There are two mutually exclusive possible events.

  • The first occurs with probability 0 ≤ p ≤ 0.5 and would reduce the value of the asset to $1500.
  • The second occurs with probability

(a) What is the threshold value at which buying insurance would be "worthwhile for both parties", as a function of p? Show working.

(b) Graph the insurance value as a function of a probability p.

4. What is the Tragedy of the Commons? How is it relevant to Internet security?

5. At some point it was planned that Starcraft would use the RealId system. Briefly explain what the ReadId system is and state why the plan was abandoned.

6. These questions relate to diversity in redundant systems:

(a) What does diversity mean in the context of redundant systems?

(b) Give a specific example of diversity in an identified system.

(c) Why does diversity in redundant systems matter?

7. Give an example of how context affects the way we interpret information. Don't use something mentioned in the lectures, lecture notes, or in the textbook.

8. Describe how you could use fault injection in the context of plagiarism detection.

9. Consider the payoff/payout table/matrix below and answer the questions that follow after it.

Alice\Bob

B1

B2

B3

B4

A1

2, 3

0, 4

1, 1

3, 3

A2

1, 3

3, 2

2, 6

1, 4

A3

4, 2

4, 4

5, 1

3, 3

A4

4, 1

3, 1

2, 2

2, 0

(a) Assuming Alice is only concerned with her own gain, is there a dominant strategy for Alice? Justify your answer and state the dominant strategy if there is one.

(b) Assuming Bob is only concerned with his own gain, is there a dominant strategy for Bob? Justify your answer and state the dominant strategy if there is one.

(c) Produce a matrix containing the difference between the result for Alice and Bob, so in each case it is the difference of the two entries, so A1B1 would contain -1.

(d) Is there a dominant strategy for Alice or Bob with respect to the difference matrix produce d in the previous part?

10. Consider the following incomplete ALE table and answer the questions that follow after it.

Event

SLE

Annual Incidence

ALE

A

$200, 000

0.004

 

B

$30, 000

 

$3, 000

C

 

200

$4, 000

D

 

100

$50

E

$400

2000

 

F

$16, 000

 

$16, 000

G

$2, 000, 000, 000

0.00000000005

 

(a) Complete the ALE table.

(b) Assuming we take no action but operate with the above, how much would we expect to lose in 5 years?

(c) Describe three general principles that can be used to determine whether a particular event needs to be dealt with. You need to think what would be appropriate guidelines.

(d) Apply the three general principles from part b. to the completed ALE table to describe what events should be addressed.

Attachment:- Assignment File.rar

Verified Expert

The assignment is unique and is developed by my understandings. the assignment is on certain different topics which needs to be considered int his like fingerprint, assessment,fault injection, security and like these topics. The assignment was made in ms word. On fingerprint few questions are solved after reducing quality also the topic is covered and after effects are also mentioned there.

Reference no: EM131809965

Questions Cloud

Discuss how many units were sold in december : How many units were sold in December? How many units were completed in December
What is the minimum attractive rate of return : If the budget is about $100,000, which of the following projects should be done? What is the minimum attractive rate of return?
Probability that at least one of the cards dealt is red : Three cards are dealt from a standard deck of 52 cards, containing 26 red cards and 26 black cards.
Dollar amounts and geometric gradients : Arithmetic gradients are stated as dollar amounts and geometric gradients as percentages.
What is the tragedy of the commons : CSCI358 Security Engineering Assignment. What is the Tragedy of the Commons? How is it relevant to Internet security
Discuss what is the present value : Assuming that you can earn 7 percent on your money, which should you choose
Estimate the chance that company will collect more prizes : A cereal company advertises a prize in every box of its cereal. In fact, only about 95% of their boxes have prizes in them.
What is the percentage increase in cost of goods sold : Assume the following cost of goods sold data for a company. If 2016 is the base year, what is the percentage increase in cost of goods sold from 2016 to 2018?
Compare the cost of individual replacement : Compare the cost of individual replacement with block replacement at 2400 hours using i = 12%. (Answer: EACindividual = $79.39 and EACbulk = $69.13)

Reviews

inf1809965

3/1/2018 5:31:14 AM

In question 10.d. The reference to part b) should be to part c). please reply me if you get it And please let me know how long it will take to complete?? Today is the due date. I need a separate file for question two I need to submit it separately. and please send me plagi report because this file will be submitted on turnitin so I need to make sure about palgi. I need separate file for question 1 part B and C. I attach a sample of original image you need to prepare the solution accordingly to this file and describe it. Thank you for your help. 27029333_1F0F2D764-0961-4E90-BF50-B424B71C1186.jpeg

len1809965

1/11/2018 5:37:45 AM

Australian student, need everything as per the guidelines. Notes on submission - Submission is via Moodle. Please submit your report in pdf, along with the Fingerprint2 file for Q1. The report may be processed through Turnitin so direct copying from websites and failure to appropriately reference will be picked up. The deadline for submission is 11:55pm Friday 26th through Moodle. Late submissions will be marked with a 25% deduction for each day, including days over the weekend. Submissions more than three days late will not be marked, unless an extension has been granted. If you need an extension apply through SOLS, if possible before the assignment deadline.

Write a Review

Other Engineering Questions & Answers

  Characterization technology for nanomaterials

Calculate the reciprocal lattice of the body-centred cubic and Show that the reciprocal of the face-centred cubic (fcc) structure is itself a bcc structure.

  Calculate the gasoline savings

How much gasoline do vehicles with the following fuel efficiencies consume in one year? Calculate the gasoline savings, in gallons per year, created by the following two options. Show all your work, and draw boxes around your answers.

  Design and modelling of adsorption chromatography

Design and modelling of adsorption chromatography based on isotherm data

  Application of mechatronics engineering

Write an essay on Application of Mechatronics Engineering

  Growth chracteristics of the organism

To examine the relationship between fermenter design and operating conditions, oxygen transfer capability and microbial growth.

  Block diagram, system performance and responses

Questions based on Block Diagram, System Performance and Responses.

  Explain the difference in a technical performance measure

good understanding of Mil-Std-499 and Mil-Std-499A

  Electrode impedances

How did this procedure affect the signal observed from the electrode and the electrode impedances?

  Write a report on environmental companies

Write a report on environmental companies

  Scanning electron microscopy

Prepare a schematic diagram below of the major parts of the SEM

  Design a pumping and piping system

creating the pumping and piping system to supply cool water to the condenser

  A repulsive potential energy should be a positive one

Using the data provided on the webvista site in the file marked vdw.txt, try to develop a mathematical equation for the vdW potential we discussed in class, U(x), that best fits the data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd