Computer Security

Page 5 of 50 - About 500 Essays
  • Premium Essay

    Intro to Computer Security Chap 2 Review Questions

    Linda Fernandez Chap 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Both management and IT management are responsible for the protection necessary to secure information. They are the ones who make the decisions regarding the appropriate security system and what level of security will work for the system. 2. Why is data the most important asset an organization possesses? What other assets in the organization require

    Words: 1293 - Pages: 6

  • Premium Essay

    Security from the Ground Up & Controlling a Computer

    Describe the three strategies people often use to make security decisions. There are three strategies for security that people can employ. The first is a rule-based decision. A rule based decision are established by external circumstances which security personal have deemed a threat that is anticipated and are widely accepted as guidelines to follow. The second strategy is relativistic decisions. Relativistic decisions are when you look at other security systems from other companies and you make yours

    Words: 476 - Pages: 2

  • Free Essay

    Computer Security

    INTRODUCTION 4 SECURITY 4 Client Security 4 Server Security 5 Document Confidentiality 5 Risks and threats to E-commerce Sites 5 Hackers 5 Software/hardware failure 5 WHY SECURITY FAIL 6 Exposure of confidential data 6 Modification of Data 6 Errors in Software 6 Poor stipulation and testing 6 Repudiation 6 Solutions to E-commerce Security Risks 7 Encryption 7 Data Encryption Standard (DES) 7 RSA Public Key Algorithm 8 Digital signatures 8 Digital certificates 9 Security for Transactions

    Words: 2106 - Pages: 9

  • Premium Essay

    Computer Security

    other controls for effective implementation.Question #05: Numerically list the 5 security controls that cryptography requires. In your own words, explain each control. | | Question #06: What is the main idea behind cryptography?Question #07: What is the main problem with symmetric cryptography?Question #08: What is the basic idea in asymmetric cryptography?Question #09: What does key length have to do with security?Question #10: What is a one-way hash function? Why is it used? SHA-1 is discussed

    Words: 1379 - Pages: 6

  • Free Essay

    Computer Security

    Computer Security Assignment 2 Solutions ECE568, Winter 2011 Introduction Answer the following questions. When a word count restriction is given for a question, exceeding it will result in marks being deducted. If your answer is more than twice the maximum length, you will get zero for the question. Please include a word count for all your answers. We recommend that you use a utility like wc on ECF to count the number of words in your answer. Your answers should be written in proper English, with

    Words: 2608 - Pages: 11

  • Free Essay

    Computer Security

    faster and use much shorter keys than existing public-key encryption methods. Usability: symmetric-key encryption is easier to understand by a non-expert than public-key encryption. 2. Give an example of the false sense of security that can come from using the “security by obscurity" approach. Solution There are many examples. One possibility would be to use a weak encryption algorithm, like the Caesar cipher and try to keep secret the type of algorithm that you are using, in addition to keeping

    Words: 578 - Pages: 3

  • Free Essay

    Computer Security

    Playing in a band can be one of the most rewarding and memorable experiences of your life. The camaraderie, creativity, exhilaration, and fun involved makes starting a band an exciting prospect. But how do you go about putting one together? What do you need to do for your band to hit the ground running and be ready for the challenges it will face down the road? Many people might not realize how much hard work goes into forming a band whether you want to stay in the garage or the next Led Zepplin

    Words: 567 - Pages: 3

  • Free Essay

    Computer Security

    offline methods. As the information at ABC institute is very sensitive, they cannot go for symmetric key if sensitive information will be sent through the World Wide Web. In order encrypt data and send it securely, Asymmetric is the stronger in security of the two. Asymmetric features key public key is shared to every one and each party or individual will have their own private key to decrypt the message and can be safe and cannot be read by others. Since it eliminates the need of sharing your secret

    Words: 475 - Pages: 2

  • Free Essay

    Computer Security

    Provide answers to the following exercises from the Goodrich and Tamassia textbook. 1) Question C-1.3 (p. 48) Suppose an Internet service provider (ISP) has a voice over IP (VOIP) telephone system that is manages and sells. Suppose further that this ISP is deliberately dropping 25% of the packets used in its competitors VOIP system when those packets are going through this ISP’s routers. Describe how a user could discover that his ISP is doing this. 2) Question C-1.12 (p. 50) Barrack often sends

    Words: 762 - Pages: 4

  • Free Essay

    Computer Security Assessment

    and save time. RBA approaches are accepted as strong and efficient technologies for access control. Answer b) If MPS is to strengthen user authentication then biometric techniques will bring a definite improvement by increasing the level of security and being cost effective. That’s because biometric techniques are the authentication methods that use one or more intrinsic physical or behavioural characteristics for recognising an individual. So, there is no question of forgetting passwords or

    Words: 550 - Pages: 3

Page   1 2 3 4 5 6 7 8 9 50