Consider an automated teller machine (ATM) in which users provide a personal identification… 1 answer below »
1. What is the difference between passive and active security threats?
2. Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system.
3. Consider a desktop publishing system used to produce documents for various organizations.
a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.
b. Give an example of a type of publication in which data integrity is the most important requirement.
c. Give an example in which system availability is the most important requirement.
4. Draw a matrix similar to the image that shows the relationship between the listed security service and the listed attacks:
– Security Services: Peer entity authentication, Confidentiality, Traffic flow confidentiality, Data Integrity, Availability.
– Attacks: Release of message contents, Traffic analysis, Masquerade, Replay, Modification of messages, Denial of service.
Attachments:
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.
