answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aalyn [17]
2 years ago
10

1. Show that the three security services-confidentiality, integrity, and availabilty- are sufficient to deal with the threats of

disclosure, disruption, deception, and usurpation.
2. A respected computer scientist has said that no computer can ever be made perfectly secure. Why might she have said this?

3. Consider a computer system with three users: Alice, Bob, Candy. Alice owns the file alicerc, and Bob and Cyndy can read it. Cyndy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cyndy can read and write the cile cyndyrc, which she owns. Assume that the owner of each of these files can execute it.

a. Create the corresponding access control matrix.

b. Cyndy gives Alice permission to read cyndyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrix.

4. A noted computer security expert has said that without integrity, no system can provide confidentiality.

a. Do you agree? Justify your answer

5. Classify each of the following as an example of a mandatory, discretionary, or originator controlled policy, or a combination thereof. Justify your answers.

a. The file access control mechanisms of the UNIX operating system.

b. A system in which no memorandum can be distributed without the author's consent.

c. A military facility in which only generals can enter a particular room.
Computers and Technology
1 answer:
nika2105 [10]2 years ago
6 0

Answer:

Answer explained below

Explanation:

1. confidentiality prevents disclosure,availability prevents disruption,integrity prevents accepting wrong data. availability and integrity will prevent disruption. the possessed data if wrongly held then its availability is affected. if actual data is impersonated then integrity is affected.

2. computers are invented by humans. they are programmed by humans. humans may tend to make mistakes and may fail to take care of all real-time possibilities. hence may not be perfectly secure

3.a. o-->owner r-->read w-->write x-->execute

                                             alicerc babrc cyndyrc

      alice                           ox  

      bob                                   rr  

      cyndy

3b                                          alicerc babrc cyndyrc

      alice                                  ox              r            r

      bob                                                     ox  

     cyndy                                  r                rw           orwx  

4. Integrity means that information is correct, and that data has not been corrupted in any way. integrity ensures that information has not been compromised, that the information is valid and is a result of authenticated and controlled activities. If we don’t have any way to confirm and ensure that this is true, we can’t guarantee confidentiality.

5.a.discretionary access control

Since users can assign and modify permissions that they possess, access control is discretionary.

5.b.originator access control

This would be originator access control. This is because if I am the author of the memorandum I am

the one who can say my information can be distributed, no one else can.

5.c.mandatory access control

The system controls access and an individual cannot change that. There is a somewhat tricky scenario

though that could possibly make this discretionary; if there is an owner of the 'military facility' and this person also had the ability to promote military personnel to 'general'. In this way the facility owner could grant access to their facility.

You might be interested in
Warm colors including red, yellow and orange _____________ be energetic and exciting to the eye, while cool colors in blue, gree
andriy [413]
What’s the question?
6 0
2 years ago
Match the vocabulary word to the accurate definition. A software program that enables you to search for, interact with, and retr
SashulF [63]

Answer:

A software program that enables you to search for, interact with, and retrieve information resources: Search Engine

A method by which data is transferred from one computer to another through the Internet Data Transfer

Coordinates actions between the user interface and the rendering engine: Operating Systems

Handles requests for information resources from networked servers: SERVER

Includes web pages, images, videos, music files, and other forms of content WEBSITE

Enables a browser to save browsing information Advanced Settings  

Includes an address bar, Back and Forward buttons, bookmarking menu, and other useful features Web browser

Displays content on the screen. Monitor

Explanation:

If you enable the browser to remember the browser experience, then you certainly need to go inside the advanced settings and from there you can check remember last 7 days and other options. Content is displayed on Monitor, And it is the website that shows images, video, text etc. The information resources are being controlled through the server, and Data transfer is the transfer of the data from one computer to other via a proper network. And the Data is collected, interacted as well as retrieve information via the search engines. And operating system is definitely the interface, and an educated one in between user interface and the rendering engine.

4 0
2 years ago
Read 2 more answers
A technician has been asked to test an inkjet printer purchased 6 months ago that is being pulled from stock and put into use fo
kodGreya [7K]

Answer:

The answer to the following question is to Replace the cartridge with a new one.

Explanation:

An inkjet cartridge or ink cartridge is the component or container of the inkjet printer which contains the ink that deposited on the paper during the printing.  

Each of the inkjet cartridge reserve the one or more ink and the other procedure also adds a chip and electronic contacts which communicates with printer.

6 0
2 years ago
What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
umka21 [38]

The hard disk drive, OR HDD Stores all the information on the computer.

5 0
2 years ago
Read 2 more answers
CHALLENGE ACTIVITY 2.9.1: Coordinate geometry. Determine the distance between points (x1, y1) and point (x2, y2), and assign the
Burka [1]

Answer:

<em>import java.util.Scanner;</em>

<em>public class TestClass {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner input = new Scanner(System.in);</em>

<em>        System.out.println("Enter value for x1, x2, y1, y2");</em>

<em>        double x1 = input.nextDouble();</em>

<em>        double x2 = input.nextDouble();</em>

<em>        double y1 = input.nextDouble();</em>

<em>        double y2 = input.nextDouble();</em>

<em>        double xVal = Math.pow((x2-x1),2);</em>

<em>        double yVal = Math.pow((y2-y1),2);</em>

<em>        double distance = Math.sqrt(xVal+yVal);</em>

<em>        System.out.println(distance);</em>

<em>    }</em>

<em>}</em>

Explanation:

The code is written in Java Programming Language.

This code simply implements the formula for the distance between two points given as

distance =\sqrt{(x2-x1)^{2}+(y2-y1)^{2}  )}

The scanner class is used to prompt and receive all the variables that are declared.

Note that we used two special Java methods (Math.pow and Math.sqrt)

7 0
2 years ago
Other questions:
  • The Spinning Jenny reduced the number of workers necessary to _______. a.remove cotton seeds from fibers b.pump water from the m
    7·1 answer
  • When a switch configuration includes a user-defined error threshold on a per-port basis, to which switching method will the swit
    13·1 answer
  • One of the most toxic components of a computer is the
    11·1 answer
  • Write a program to determine all pairs of positive integers, (a, b), such that a &lt; b &lt; 1000 and [a2 + b2 + 1)/(ab) is an i
    13·1 answer
  • What output is produced by the following program segment? Why? (Recall that name.charAt(i) is the i-th character in the string,
    11·1 answer
  • __________ access control is a form of __________ access control in which users are assigned a matrix of authorizations for part
    8·1 answer
  • E xercise 17.2.4: The following is a sequence of undo-log records written by two transactions T and U: &lt; START T&gt;; ; &lt;
    15·1 answer
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
  • Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
    7·1 answer
  • You are having a problem with your Windows computer that is isolated to a single graphics editing program that you use every day
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!