Consider an automated teller machine (ATM) in which users provide a personal identification… 1 answer below »

1. What is the difference between passive and active security threats?

2. Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system.

3. Consider a desktop publishing system used to produce documents for various organizations.

a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.

b. Give an example of a type of publication in which data integrity is the most important requirement.

c. Give an example in which system availability is the most important requirement.

4. Draw a matrix similar to the image that shows the relationship between the listed security service and the listed attacks:

– Security Services: Peer entity authentication, Confidentiality, Traffic flow confidentiality, Data Integrity, Availability.

– Attacks: Release of message contents, Traffic analysis, Masquerade, Replay, Modification of messages, Denial of service.

Attachments:

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.