Consider an automated teller machine (ATM) in which users provide a personal identification… 1 answer below »
1. What is the difference between passive and active security threats?
2. Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system.
3. Consider a desktop publishing system used to produce documents for various organizations.
a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.
b. Give an example of a type of publication in which data integrity is the most important requirement.
c. Give an example in which system availability is the most important requirement.
4. Draw a matrix similar to the image that shows the relationship between the listed security service and the listed attacks:
– Security Services: Peer entity authentication, Confidentiality, Traffic flow confidentiality, Data Integrity, Availability.
– Attacks: Release of message contents, Traffic analysis, Masquerade, Replay, Modification of messages, Denial of service.
Attachments: