Preview

Midterm Guidline Essay Example

Good Essays
Open Document
Open Document
356 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Midterm Guidline Essay Example
Midterm Exam Guideline! 1. What is security? 2. Define 6 threats. 3. What is user authentication? 4. Why do we use user authentication? 5. Who uses user authentication? 6. Please provide 3 different types of user authentication with examples. 7. How do we define security goals? 8. Provide 4 examples of security goals in a company. 9. For each goal list one to three controls to help achieve that goal. 10. For multiple choice questions. The question will be... Which of the following is a correct statement? 11. Explain how asymmetric encryption works, how hashing algorithm work. 12. How can hashing algorithm be used to provide authentication and data integrity. – lecture 3 13. Between a sender and a receiver, how can a long number (encryption key) be shared over a secure and unsecure network without losing data confidentiality? - lecture 3 14. How can a hashing algorithm help organizations today? – lecture 3 15. What is asymmetric encryption? – lecture 3 16. Explain how hashing algorithm works and how it can be used to provide authentication integrity. 17. Asymmetric information – how to communicate messages from user A to B ensuring data confidentiality, authentication, integrity. – key… which keys to use to obtain these goals. What keys you are using for each one of confidentiality, authentication and integrity. 18. Advantage and disadvantage of using tcp as a transfer protocol. 19. Advantage and disadvantage of using udp as a transfer protocol. 20. Situational question. Opened Wi-Fi networks pros and cons. Why do you need a security network? Give 5 reasons. 21. Database integrity – do multiple or identical records have any effect on the integrity of the database? 22. List and define 5 desirable qualities in a process designed to evaluate the trustworthiness of an operating system. 23. Look for another question 24. Security threats – 5 different types

You May Also Find These Documents Helpful

  • Satisfactory Essays

    8) Which of the tenets of information security is most related to the “need to know” property? C) Confidentiality…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    AIS Review Sheet

    • 2832 Words
    • 12 Pages

    3) Authentication: Verifying the identity of the person or device attempting to access the system.…

    • 2832 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    4. Which of the following components can be used to measure the confidence in any authentication system?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 637

    • 297 Words
    • 2 Pages

    1.2. Explain the legal requirements and agreed ways of working for the security and confidentiality of information.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab Answers

    • 617 Words
    • 3 Pages

    3. If you were using corporate e-mail for internal and external communications but did not want to encrypt an e-mail message, what other security countermeasure can you deploy to ensure message integrity?…

    • 617 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Acct 332 Db2

    • 358 Words
    • 2 Pages

    Question 4: Data integrity is essential for a company 's operations. Describe various steps companies can use to ensure the integrity of its information.…

    • 358 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    ISSC362 Lab 2 Assessment

    • 492 Words
    • 2 Pages

    Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.…

    • 492 Words
    • 2 Pages
    Good Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Something you know refers to the use of passwords, passphrases, and codes or PINs. When creating a password, the user must make the decision to create a string of alphanumeric and special characters with differing cases. The longer and more complicated a password the user creates drastically reduces the risk of cracking or brute force attacks. The same password must also be something easily remembered by the user to dissuade it from being written down and stored onsite or left at the workstation. A solution to this is creating a passphrase, a common phrase or date abbreviated and linked together with special characters to create a personal passphrase difficult to crack but easy to remember. An example of this would be a favorite television show with the day and time it airs. A common rule is to create a string at least eight character longs with at least one number and one special character, which this example adheres.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    References: 1. 2. 3. 4. 5. 6. 7. 8. Menezes, A. J. Elliptic curve public key cryptosystems. Kluwer Academic Publishers, 1993. Schneier, B. Applied cryptography. John Wiley & Sons, Inc., 1994. Enge, A. Elliptic curves and their applications to cryptography. Kluwer Academic Publishers, 1999. Menezes, A.., Oorschot, P., and Vanstone, S. Handbook of Applied Cryptography. CRC Press, 1997. Weisstein, E. W. “Number Field Sieve”. Wolfram Research, Inc. Stallings, W. Cryptography and Network Security. Prentice Hall, 2003. Silverman, R. D. “An Analysis of Shamir’s Factoring Device”. RSA Security. May 3, 1999 Shamir, A. “Factoring Large Numbers with the TWINKLE Device”. In proceedings of Cryptographic Hardware and Embedded Systems: First International Workshop, CHES '99. Lecture notes in Computer Science, vol.1717. Springer-Verlag Heidelberg, January 1999: p 2 – 12. Lercier, R. Homepage. Schneier, B. “Elliptic Curve Public Key Cryptography”. Cryptogram ENewsletter. November 15, 1999 “Remarks on the Security of the Elliptic Curve Cryptosystem”. Certicom, whitepaper. September 1997. Blake, I., Seroussi, G., and Smart, N. Elliptic Curves in Cryptography. Cambridge University Press, 1999. Menezes, A., Okamoto, T., and Vanstone, S. “Reducing elliptic curve logarithms to logarithms in a finite field”. Proceedings of the twenty-third annual ACM symposium on Theory of computing. Annual ACM Symposium on Theory of Computing. ACM Press, 1991: p 80 – 89. Satoh, T. and Araki, K. “Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves”. Commentarii Mathematici Universitatis Sancti Pauli 47, 1998: p 81 – 92. Semaev, I. A. “Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p”. Mathematics of Computation 67, 1998: p 353 – 356. Smart, N. “The discrete logarithm problem on elliptic curves of trace one”. Journal of Cryptography, vol. 12 no. 3. Springer-Verlag New York, October 1999: p 193 – 196. Certicom Press Release. “Certicom Announces Elliptic Curve Cryptosystem…

    • 9274 Words
    • 38 Pages
    Powerful Essays