Assignment 1: Fran’s Virtual Fruit Stand Part 1 Complete Solution
The amount of secrecy needed should determine the amount of labor appropriate for the encryption and decryption |
Question 2.2. Name the three principle kinds of PROGRAMMING controls used to protect security of data and explain what each of them does: (Points : 0.5) |
True |
Question 4.4. Your computer is going to transmit the letter “N” using ASCII encoding. The seven bit ASCII code for the letter N is 1001110. Your computer will add an eighth bit, and it is using even parity. Will it add a “1” or a “0”? (Points : 0.5)
|
True |
Packet Filtering Firewalls block packets from addresses known to be suspect or dangerous and may block certain protocols, such as FTP. |
Question 7.7. What is the definition of privacy, as we discussed it in class (Points : 0.5) |
True |
True |
Gender |
Question 11.11. What is the data inference problem? Name two kinds of controls you would implement to protect against data inference, and under what circumstances would you use each one? (Points : 0.5) |
Question 12.12. Name the seven different network security controls discussed in class and explain what each of them protects or enforces (Points : 0.5) |
Question 13.13. Name and explain the two different types of Intrusion Detection Systems: (Points : 0.5) |
Monitors users and system activity |
True |
True |
True |
Subject |
Question 19.19. Explain the difference between the secure email requirements of sender authentication and non-repudiation (Points : 0.5) |
Question 20.20. The government agency that may sue if a company posts false statements about privacy protection is the _____________ ___________ ______________ (Points : 0.5)
|
Do not realize they must assume a significant amount of responsibility for security |
True |
Time (e.g. annually, every two years, …) Either time or an event |
Question 24.24. List and explain three ways to maintain privacy, as defined in class. (Points : 0.5) |
Question 25.25. Explain the difference between a Business Continuity Plan and an Incident Response Plan (Points : 0.5) |
True |
Question 27.27. Name the three issues addressed by the Security Policy section of the Security Plan: (Points : 0.5) |
|
True |
|
Legal rules regarding tangible property |
|
True |
True |
True |
Court |
Question 37.37. Describe two kinds of content integrity controls for network security (Points : 0.5) |
True |
Question 39.39. Name three different things that can be authenticated. Which is the most difficult to authenticate? (Points : 0.5) |
Question 40.40. In analyzing your company’s risk to a set of vulnerabilities, you determine that your risk exposure could be reduced from $35 million to $19 million. The cost of applying appropriate controls to achieve this reduction in risk exposure would be $4 million. (Points : 0.5)
|
|
Question 42.42. Explain the two phases of the two-phase update process for maintaining data base integrity (Points : 0.5) |
Universal Deontology |
Question 44.44. Explain your choice in the previous question. (Points : 0.5) |
Question 45.45. Estimate how long you need to make a password to make it secure from a brute force attack for one year using only upper case letters plus the numbers 0 through 9 plus the following nine special characters: !#$%^&*)(. Assume an attacker has a system that operates at 4 billion instructions per second, and that it takes 12 instructions to test each password? To simplify your calculation, assume the attacker only has to test the exact length password you estimate, but not all smaller lengths as well. You must show your calculations. (Points : 1) |
Question 46.46. The following ciphertext has been derived from a simple substitution cipher of the form Ci = Pi + N. Find the value of N that decrypts the ciphertext, decrypt it, and write the plaintext below. The numbers and letters below the ciphertext are there to make your task easier. You do not need to write down the value of N in your answer. Enter your answer using only upper case letters.
|
Question 47.47. Encrypt the phrase, "TELEOLOGICAL THEORY FOCUSES ON CONSEQUENCES", using a simple transposition cipher with eight rows and five columns. Type the resulting ciphertext in upper case letters only. Your result should contain 7 groups of five letters each and a final group of four letters and there should be a space between each group of letters in the ciphertext. Ignore the quote marks and ignore all spaces in the plaintext phrase. (Points : 1)
|
Assignment 1: Fran’s Virtual Fruit Stand Part 1 Complete Solution
A+ grade guaranteed! I always give g...
A+ - Thank you!
Thanks for the positive feedback!