DOC PREVIEW
U of I CS 498 - Information Assurance

This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Information Assurance: Homework 1Name:Information Assurance: Homework 1Due September 1, 20061. What do you hope to get out of this class?2. What is your main area of interest in computer security?3. What programming languages are you comfortable with? What operating systemsare you comfortable working with?Name:4. Consider the following topics. You have 8 positive marks and an optional 8 negative marks that you can apply to these topics. We will touch on most of thesetopics this semester. Your feedback will influence the degree we go into these topics this and future semesters. For example, if you are very interested in Information warfare and Disaster recovery, you may split your positive marks between these two. If Hardware Security does not interest you, you may apply your negative marks to this topic. You should apply all positive marks. You do not need to apply negative marks. a. Computer security and the law.b. Security and Ethicsc. Cryptographic theory and algorithmsd. Public Key Infrastructure and other network security protocolse. Information Warfaref. Computer Forensicsg. System Evaluation and Accreditationh. Security System Development Processesi. Disaster Recoveryj. Security of Critical Infrastructures such as Process Control or SCADA systemsk. Ethical hacking and software vulnerabilitiesl. Hardware support for securitym. Physical Securityn. Emanations or TEMPEST securityo. Database Securityp. Other topics? Please note.Name:5. Classify each of the following as a violation of confidentiality, of integrity, of availability, or of some combination thereof. Briefly explain your reasoning.a. Mary forges Bob's name on a check.b. Mary forges Bob's name on a check with his knowledge and permission.c. Larry incorrectly configures his scanning tool and ends up using 90% of the network bandwidth in his computer lab.d. Sara sniffs traffic to retrieve Anna's FTP account information.e. Margret's computer is infected via an unpatched OS bug causing her computer to run slowing and send out unauthorized traffic.f. Blaine registers the domain name goggle.com and other close typos of google.com, and he presents an interface similar to google's on these URL's.Name:6. Given the mechanism state policy that could be enforced by this mechanism.a. Parent of child enrolling in grade school must present two ID's showing current address.b. Credit card can only be activated by calling specified number from the home phone.c. New passwords must be at least eight characters and include a combination of alphabetic and non-alphabetic characters.7. Given the policy briefly outline an enforcing mechanism.a. Students should not copy other student's computer problem solutions.b. Employees must not send personal email from their work addresses.c. Company proprietary information must be protected from unauthorized


View Full Document

U of I CS 498 - Information Assurance

Documents in this Course
Lecture 5

Lecture 5

13 pages

LECTURE

LECTURE

39 pages

Assurance

Assurance

44 pages

LECTURE

LECTURE

36 pages

Pthreads

Pthreads

29 pages

Load more
Download Information Assurance
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Information Assurance and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Information Assurance 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?