Question: For this task you will first practice modulo operation that is the basis for most encryption methods. If you are not familiar with it, there

For this task you will first practice modulo operation that is the basis for most encryption methods.

If you are not familiar with it, there are many explanations on the web. Then you will have to answer the question that the result of the operation points to.

You have to calculate xxxxxxx mod 3 (where xxxxxxx is your seven-digit student number), and show the result.

Then, if the Result is 0 you need to answer question 4.0, if the result is 1 you need to answer question 4.1 and if the result is 2 your question is 4.2.

Below is a list of security mechanisms and threats. For each security mechanism, indicate whether it is very effective, mostly effective, partially effective, partially ineffective, or not effective against the listed threats.

Provide a brief explanation for each answer. Include a description of threat and mechanism as part of your explanation.

For some combinations there may be more than one possible effectiveness depending on the scenario, so use partially effective, mostly effective or mostly ineffective to indicate these borderline cases (and the situations where this can vary). eg. House Keys are a mostly effective security (since they are very effective unless they are lost/stolen/copied)

Question 4.0

Security mechanisms: Packet filter, X.509 certificates, sandboxing, encryption

Threats: Key loggers, malicious insider, CPU/resource stealing, worm, clickjacking, phishing, password cracking, person in the middle attack, ransomware.

Question 4.1

Security mechanisms: Multifactor authentication, digital signature, same-origin policy, exponential backoff

Threats: Key loggers, malicious insider, CPU/resource stealing, worm, clickjacking, phishing, password cracking, person in the middle attack, ransomware.

Question 4.2

Security mechanisms: audit logs, IPsec, backups, anomaly-based intrusion detection

Threats: Key loggers, malicious insider, CPU/resource stealing, worm, clickjacking, phishing, password cracking, person in the middle attack, ransomware.

For this task you will first practice modulo operation that is the

Key loggers Mechanism 1 (modify accordingly) Not effective Reasoning Mechanism 2 (modify accordingly) Mostly ineffective Reasoning Mechanism 3 (modify accordingly) Partly effective Reasoning ... Mechanism 4 (modify accordingly) Mostly effective Reasoning Malicious insider Very effective Reasoning CPU/resource stealing Worm Clickjacking Phishing Password cracking Person in the middle attack Ransomware Key loggers Mechanism 1 (modify accordingly) Not effective Reasoning Mechanism 2 (modify accordingly) Mostly ineffective Reasoning Mechanism 3 (modify accordingly) Partly effective Reasoning ... Mechanism 4 (modify accordingly) Mostly effective Reasoning Malicious insider Very effective Reasoning CPU/resource stealing Worm Clickjacking Phishing Password cracking Person in the middle attack Ransomware

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!