Question

HOMEWORK 1: CS 386 (Cryptography) Due Date: January 25, 2018 1. Write short answers for each one of them a) Method of concealing data including messages, files, keys and passwords is known as: b) Method to protect blocks of data from being altered is known as c) What are three parts of CIA triad? d) What is the main difference between accountability and availability e) What is the ITU-T recommended security architecture for OSI called? 2. Explain the differences between active and passive attacks. Give suitable examples. 3. What are the four categories of active attack? Write short notes for each of them. 4. Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement 5. Make a sketch of model for network security and show how cryptography plays an important role in it.
0 0
Add a comment Improve this question Transcribed image text
Answer #1

1)

a) method of concealing data including messages, files, keys and passwords is known as symmetric encryption

b) method to protect blocks of data from being altered is known as data protection

c) three parts of CIA triad - Confidentiality, Integrity, availability

d)

Accountability Availability
specifically applying the traceability of actions to the system entity It maintains the hardware by providing the function of repair whenever it it necessaryand also maintains the operating systems functioning.

e) itu-t recommended security architecture for OSI called X800

2.

Active Attack Passive attack
Detection is tends to be easiier Detection is tends to be difficult
It harms the system It does not harms the system
The main aim of an attacker is to alter the information or original message The main aim of an attacker is to retrive the provided information
Attacks cannot be prevented easily Attacks can be prevented

Types:

  • Masquerade
  • Replay
  • Denial of service
  • Modification of message

Types:

  • Release of message
  • Content
  • Analysing traffic
Ex: Making an attempt to entry into other account. Ex: Eves dropping

3) Categories of Active attack

  • Masquerade - Making to attempt to enter in a particular system for retrieving information
  • Replay - accessing information from the authorised user system by using their session ID
  • Denial of service - Blocking the service of accessing to the authorized users.
  • Modification of message - attacker attacks the address of the packet header to transfer the data to some other destination address.
Add a comment
Know the answer?
Add Answer to:
HOMEWORK 1: CS 386 (Cryptography) Due Date: January 25, 2018 1. Write short answers for each...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • 10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated...

    10. Write a one-page summary of the attached paper? INTRODUCTION Many problems can develop in activated sludge operation that adversely affect effluent quality with origins in the engineering, hydraulic and microbiological components of the process. The real "heart" of the activated sludge system is the development and maintenance of a mixed microbial culture (activated sludge) that treats wastewater and which can be managed. One definition of a wastewater treatment plant operator is a "bug farmer", one who controls the aeration...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT