Question: infromation security principles , please answer these questions in details Bob offered Alice an X amount of money to complete a job. A hash value

infromation security principles , please answer these questions in details
infromation security principles , please answer these questions in details Bob offered
Alice an X amount of money to complete a job. A hash
value of the offer was calculate, the offer was digitally signed by
Bob and sent to Alice. At pay time. Alice presented a request
for the payment of $100, but Bod claimed that the offer was
for $50. He presented a copy of the offer with a hashed
value that confirms the $50, but Alice presented a different hash value

Bob offered Alice an X amount of money to complete a job. A hash value of the offer was calculate, the offer was digitally signed by Bob and sent to Alice. At pay time. Alice presented a request for the payment of $100, but Bod claimed that the offer was for $50. He presented a copy of the offer with a hashed value that confirms the $50, but Alice presented a different hash value that shows a $100 pay. How would you determine if Bob changed the offer and calculated a matching hash value or Alice change the offer, and calculated a matching hash value? (6 Points) Enter your answer Enter your answer In Demilitarized Zone(DMZ), an untrusted outside users can access DMZ but not the secure network, which provides additional security from external attacks, but does it prevent against internal attacks? If so, how does it add an additional layer of security to an organization's LAN. (4 Points) Enter your answer O Band C 17 Answer one of the following questions: A) I claim that lack of access control policy is a Vulnerability not a Threat. Do you agree (1 points)? Explain your answer (4 points) B) is Man in the Middle attack passive or active attack? Explain your answer (4 Points) Enter your answer 18 Answer one of the following questions: A) A company is planning to enhance its security by implementing the latest security systems. The Security team are having a dispute to implement an intrusion prevention systems (IPS) and a firewall, or firewall with Intrusion Detection capability. Explain how Security Risk Assessment can help resolve this dispute, and make the right choice for the company? B) Explain how understanding the available cybersecurity defenses would help organizations prioritize risk mitigations as part of a defense in-depth strategy. (6 Points) Enter your answer gbZoiCGAYL-569HP UNTUKNEZEWFAMVIRGMANIRRI 23 An insurance company asks for your opinion about the best way to grant access to their systems. Explain why/why not they need both authentication and access control? What is the best authentication method they may implement? (4 Points) Enter your answer 24 Impact Likelihood or Occurrence Looking at the Security Risk Prioritization diagram, explain why when the likelihood is low and the Impact is high the priority is 2 and when the likelihood is High and the impact is Low the priority is 3. (4 Points) Enter your answer 25 Answer one of the following questions: A) Explain how a VPN can hide a user's browsing activity and how it can prevent user's personal browsing data leakage? B) No organization with sensitive data or critical operations should be without anomaly- based detection to protect against existing security attacks. Do you agree? Explain your answer (4 Points) Enter your answer Bob offered Alice an X amount of money to complete a job. A hash value of the offer was calculate, the offer was digitally signed by Bob and sent to Alice. At pay time. Alice presented a request for the payment of $100, but Bod claimed that the offer was for $50. He presented a copy of the offer with a hashed value that confirms the $50, but Alice presented a different hash value that shows a $100 pay. How would you determine if Bob changed the offer and calculated a matching hash value or Alice change the offer, and calculated a matching hash value? (6 Points) Enter your answer Enter your answer In Demilitarized Zone(DMZ), an untrusted outside users can access DMZ but not the secure network, which provides additional security from external attacks, but does it prevent against internal attacks? If so, how does it add an additional layer of security to an organization's LAN. (4 Points) Enter your answer O Band C 17 Answer one of the following questions: A) I claim that lack of access control policy is a Vulnerability not a Threat. Do you agree (1 points)? Explain your answer (4 points) B) is Man in the Middle attack passive or active attack? Explain your answer (4 Points) Enter your answer 18 Answer one of the following questions: A) A company is planning to enhance its security by implementing the latest security systems. The Security team are having a dispute to implement an intrusion prevention systems (IPS) and a firewall, or firewall with Intrusion Detection capability. Explain how Security Risk Assessment can help resolve this dispute, and make the right choice for the company? B) Explain how understanding the available cybersecurity defenses would help organizations prioritize risk mitigations as part of a defense in-depth strategy. (6 Points) Enter your answer gbZoiCGAYL-569HP UNTUKNEZEWFAMVIRGMANIRRI 23 An insurance company asks for your opinion about the best way to grant access to their systems. Explain why/why not they need both authentication and access control? What is the best authentication method they may implement? (4 Points) Enter your answer 24 Impact Likelihood or Occurrence Looking at the Security Risk Prioritization diagram, explain why when the likelihood is low and the Impact is high the priority is 2 and when the likelihood is High and the impact is Low the priority is 3. (4 Points) Enter your answer 25 Answer one of the following questions: A) Explain how a VPN can hide a user's browsing activity and how it can prevent user's personal browsing data leakage? B) No organization with sensitive data or critical operations should be without anomaly- based detection to protect against existing security attacks. Do you agree? Explain your answer (4 Points) Enter your

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!