What sorts of protection is provided by the bank

Assignment Help Computer Network Security
Reference no: EM13838111

Part A: Answer the following questions :

1. Reports of computer security failures appear frequently in the daily news. Research and summarise the article that exemplifies one (or more) of the principles: easiest penetration, adequate protection, effectiveness, weakest link. Ensure the link and full reference is included.

2. Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

3. An electronic mail system could be used to leak information. First, explain how the leakage could occur. Then, identify controls that could be applied to detect or prevent the leakage. Justify your answer based on literature.

4. A computer system provides protection using the Bell-La Padula policy. How would a virus spread if:

• the virus were placed on the system at system low (the compartment that all other compartments dominate)?

• the virus were placed on the system at system high (the compartment that dominates all other compartments)?

Part B:

Task 1. Go to a web site where you do regular banking. Visit this website carefully and answer the following questions:

a. How do you know that the information you type in is secure from phishing?

b. What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

Task 2. Consider a PIN card entry to a secure area for a publishing company that prints confidential documents for other companies such as exam papers for universities and health record for customers. Suggest some examples of confidentiality, integrity and availability in such a scenario. Summarize the requirements as well as the degree of importance for each item associated with such a system with your recommendation in a brief (250-500) words report. Must follow APA style referencing.

Task 3. Mr. Bob is accessing his personal bank account (through a web browser) using an Internet Café. Mr. Bob has opened a text editor simultaneously along with web browser. Suddenly Mr. Bob suspected that the Café computers are infected with malware called 'software keyloggers'.

As a security expert, you need to describe a scheme that allows Mr. Bob to type his userID and Password that the malware (i.e. keylogger), used in isolation of any screen captures or mouse event captures, would not be able to discover Mr. Bob's userID and password.

Reference no: EM13838111

Questions Cloud

Demonstrates mastery in the rhetorical technique : Write thoughtfully with thorough detail and supporting examples to substantiate the claims you state. Write with purpose and direction that demonstrates mastery in the rhetorical technique of argument
What is the communication climate like in your organization : To what degree does your company use technology? Website? Sell products on it? What is the communication climate like in your organization
Can apple justify their behaviour : Can Apple justify their behaviour? Use the shareholder and stakeholder theories of corporate social responsibility to evaluate Apples behaviour and frame your answer.
What issues should be considered in drafting code of conduct : Within the Discussion Board area, write 600-800 words that respond to the following questions with your thoughts, ideas, and comments. Why is it important for a company to have a written code of conduct? What issues should be considered in drafting ..
What sorts of protection is provided by the bank : What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.
Which side of health triangle corresponds to getting enough : Which side of the health triangle corresponds to getting enough rest?
What transferable skills do you have : Examine the critical skills and competencies required to achieve success. What transferable skills do you have and how can these skills be leveraged if you decide to take a different career or life path? How can your professional experience help you ..
Build model for predicting survival of passengers on titanic : Build a model for predicting the survival of passengers on the Titanic using a decision tree in RapidMiner using the two data sets, titanic3_train.csv and titanic3_score.csv.
Discuss the staffing needs of your organization : Discuss the staffing needs of your organization. Thoughtfully discuss each listed item (two to three fully developed sentences per item)

Reviews

Write a Review

Computer Network Security Questions & Answers

  What sorts of protection is provided by the bank

What sorts of protection is provided by the bank to ensure secure online banking? Justify why the bank would use these security measures.

  Write an information security white paper

Information Technology Security for Small Businesses video from the National Institutes of Standards and Technology

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  Securing of computer forensics evidence

Securing of Computer Forensics Evidence

  Please type a three- to five-page 800 to 1200 words paper

please type a three- to five-page 800 to 1200 words paper. using apa style assess the importance of developing a

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Find a sample phishing email

Use Google to find a sample phishing email which there are many of on the Internet

  Cryptography problem

Alice, Bob, and Carol want to use secret key cryptography to authenticate each other. Compare the security of having a single shared secret that they all share, with the security of having each of them use their own secret

  What are the core components of a pki

What are the core components of a PKI? Briefly describe each component - Explain the problems with key management and how it affects symmetric cryptography.

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  Assignment on network security

the selection of a virtual private network (VPN) for a midsize network.You shall actually identify the hardware and software needed to meet the network security and users requirements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd