Worth 2 Points Each Problem Essay

Download this Essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Essay:

It also has only printable characters

Washington

The character is unsuitable since it contains more than 8 characters. It can be guessed by dictionary attack since it is a common name

Aristotle

The password is unsuitable since it has more than 8 characters. Can be guessed by a dictionary attack since it is a common name

Tv9stove

The password is suitable since the character length does not exceed eight characters and it contains printable characters

12345678

The password is too obvious so it is unsuitable

Dribgib

The password is suitable since it does not contain more than 8 characters. It also contains printable characters.

Problem 3.6

95*95*95*95*95*95*95*95*95*95 + 6.4 million

=95^10/6.4 million

Chapter 4

Question 4.1

DAC is used to define the basic access control policies to various objects. These are set according to the needs of the object owners. The MAC are access control policies that are system-controlled. The system in this case dictates as well as controls the acess levels to various objects.

Question 4.2

RBAC is a completely separate as well as distinct model from DAC and MAC. There are however several relationships between them. As an example, RBAC can effectively simulate DAC and MAC. MAC can also be employed in the implementation of RBAC whenever the role hierarchy is in the form of a tree as oppose to being a partial order.

Question 4.5

Access right are authorization levels that are set for files, folders, partitions and hard drives in order to dictate the level of access, data manipulation as well as general uses of the computing resources.

Problem 4.3

a.

The advantages of using four modes instead of two are;

The ability to implement a fine-grained security policy

The ability to provide a distinction within system kernel code.

Disadvantages

Uses too much system resources (Memory in particular)

b.

Yes. A case with more than four modes is achievable. Examples are User-mode debugging, Target application execution, Sleep mode and Kernel-mode debugging.

VAX, x86 can support four modes. The earlier archs (Multics) supported even more modes

Chapter 5.5

The concept of cascading authorization is a security access control technique that works whenever two or more subjects are given the permission of granting as well as revoking some aspects of the access rules to other system subjects. The outcome is the creation of a cascade revocation chain.

Question 5.6

An inference threat is recorded of a given user can effectively deduce sensitive data/information from the otherwise non-sensitive data. It can lead to the exposure of confidential information as well as loss of data and its integrity.

Problem 5.5

In order to effectively determine which value of X's successful grants of EMPLOYEE must subjected to revocation, we must form a list of all remaining grants of X's.

USERID

TABLE

READ

DELETE

X

EMPLOYEE

(15,30)

(15)

(30)

The list of X's grant to others must also be drawn

USERID

TABLE

READ

DELETE

Y

EMPLOYEE

(25)

(25)

(325)

The grant of DELETE privilege by X at a time when t-25 must get revoked as a result of its earliest remaining DELETE privilege that was receive at the time t-30. The X's grants if INSERT and READ are however allowed to remain since they are at that moment 'supported' by the incoming grants that occurred at an earlier time.

Chapter 6

6.3. Describe the difference between host-based IDS and network-based IDS

A host-based IDS is installed on a given machine and then performs its duties of monitoring the abnormalities in the oncoming traffic. A network IDS on the other hand resides on a span port of a switch from where it monitors all of the information that emanates from the firewall in to the internal network. A larger network may have several strategically positioned sensors.

6.4. What are the three benefits that can be provided by an IDS

1. Should an intrusion be promptly detected, the intruder can effectively be identified as then ejected from the system in good time before any damage is done to thedata or the system. The system is important since it can help prevent further damage should the intrusion be detected early

2. An effective IDS can act as an effective deterrent in the prevention of intrusions

3. Intrusion detection allows for the collection of information on various intrusion techniques. The information can then be used in strengthening of the IDS.

6.5

• Ever running

• Tolerant to fault

• Resist to Subversions (Attacks on the IDS)

• Very little overhead

• Highly scalable

• Degradation of the IDS service should never affect the rest of the network.

• Has dynamic configuration to adjust its settings according to the intrusion condition

6.6

Depending on the specific network conditions and the environment, network-based IDS may have advantages as well as disadvantages. The disadvantages may include a higher learning curve in the installation, editing as well as maintenance of the software. One must be familiar with the command line interface of some of the software. The creation of the policy as well as editing of the policy posses another challenge. The advantages include;

Running of software like Tripwire on a platform which is Unix-based can be very daunting for a person…[continue]

Cite This Essay:

"Worth 2 Points Each Problem" (2011, September 23) Retrieved December 7, 2016, from http://www.paperdue.com/essay/worth-2-points-each-problem-45685

"Worth 2 Points Each Problem" 23 September 2011. Web.7 December. 2016. <http://www.paperdue.com/essay/worth-2-points-each-problem-45685>

"Worth 2 Points Each Problem", 23 September 2011, Accessed.7 December. 2016, http://www.paperdue.com/essay/worth-2-points-each-problem-45685

Other Documents Pertaining To This Topic

  • Social Behavior and Crime Cambridge First Certificate

    Social Behavior and Crime Cambridge First Certificate Exam The Cambridge First Certificate Exam or FCE is somewhat complex to pass however with a plan in place to study and prepare it will be less of a challenge. The level of the test is the Intermediate level of English also called Upper Interim or B2. This is based on the CEFRL or Common European Frame of Reference for Language (Driscoll, 2008). The test

  • 2 Year Old Case Study Two Year Old Child

    (Broderick & Blewitt). Aside from the major issue, at least for the parents, of Jason's reserved social demeanor; there have been several other indicators of acting our behavior that he has presented. On several occasions Jason has complained of stomachaches and headaches prior to having to go to day care or even to any other playtimes where he knows his parents will not be attending. Also, if he has felt

  • Wicked Problem Royal Dutch Shell and Its

    Wicked Problem: Royal Dutch Shell and Its Response to the Nigerian Oil Spill Major oil companies such as Royal Dutch Shell are responsible for hundreds of oil spills every year that cumulatively involve millions of barrels of oil. The harmful effects of such oil spills on the environment is well documented of course, but less well documented are the different types and levels of responses that are used in response

  • Reducing the Problem of Piracy in the

    Reducing the Problem of Piracy in the Brazilian Music Industry Music piracy is a rampant problem that results in enormous losses on behalf of the international music industry. One of the countries hit hardest by the effects of piracy is Brazil, which is the world's third largest pirate market behind China and Russia, as outlined in figure 1 (IFPI, 2002). What measures can be taken that will effectively reduce music piracy

  • Problem Solving Systems Thinking Technology and Organizational

    Problem Solving Systems Thinking, Technology, and Organizational Change Models of Problem Solving Different Approaches to Problem Solving Brainstorming Risk Assessment Flow Charts Mind Mapping Identification of Complex Problem Analyzing the Problem Identification of a Range of Potential Solutions Constraints Evaluation of Potential Solutions Phase IV Evaluating Progress Implementation Process Risk Assessment Accelerating Change Formative and Summative Evaluation Values and Ethical Issues Values Corporate Responsibility and Ethics Thinking and Decision Making Strategies Problem Solving Process Complex Problem Solving This section of the paper is focusing on the introduction of complex problem solving, which reflects the

  • Problem With Trying to Monetize Ecosystems

    Monetizing Environmental Goods and Services Monetizing ecosystem services is not essential for ecological sustainability. Thus, all goods and services provided by nature should not be commoditized and given an economic value or price so that they can be traded properly and accounted for in economic decisions to bolster their conservation. Monetization is only effective in the realm of presenting penalties for ecosystem violations, though even then it presents as a flawed

  • Problem Solving and Decision Making Negotiation

    Decision-Making Assessing a Decision Based on Edward de Bono's Six Thinking Hats Technique In the book Six Thinking Hats Edward de Bono describes the process of parallel thinking. This process means looking at problems from all angles at once. Edward de Bono uses the example of four people all looking at the same house. One person is looking at the front. Another is looking at the back. The other is looking at


Read Full Essay
Copyright 2016 . All Rights Reserved