CSC 607 Week 3 Homework Assignment 3
True or False. In designing a trusted operating system, it is best to provide the user with as many privileges as possible in order to provide that user with the full capabilities of the OS. (1 point)
WRITE THIS ESSAY FOR ME
Tell us about your assignment and we will find the best writer for your paper.
Get Help Now!2. Trueor False. A trusted operating system should have an open design so that the world can examine it. (1 point)
3. In a trusted operating system, the interface between a process and the hardware is called the (1 point)
4. You were just hired at a defense contractor which enforces the military’s security model. Your secret clearance followed you from your previous job. Does that automatically entitle you access to all secret information your company has access to? Why or why not? (10 points)
5. Suppose I work in a law firm that deals with business law. We work with several different groups of companies (banks, insurance companies, oil companies). Knowing information about one particular company in a group (say Shell Oil Company) can put me in a situation where there can be a potential conflict of interest if I already have information about another company in the same group (Exxon). Explain how Chinese Wall Security Policy can alleviate potential conflicts of interests (5 points)
6. The method of deriving sensitive information from less sensitive information is an example of
7. Briefly explain two methods for performing an inference attack on a database and a recommendation of a defense against these attacks. Is there an optimal defense against inference attacks? (10 points)
8. To prevent an inference attack, one of the controls involves rejecting a query without providing a response. This is an example of (1 point)
9. True or False. Protecting only data in a database that contains only sensitive data is a fairly simple problem. (1 point)
10. Based on our discussion in class, explain in a regular (untrusted) operating system how an attacker can gain access to sensitive data you thought you disposed of. How would a trusted operating system prevent this and what is this capability called? (10 points)
11 In a trusted OS, which component of the OS is responsible for enforcing security? (5 points)
12. True or False. In network architectures, a logical connection exists only in hardware. (1 point)
13. True or False. Ideally, security should not be implemented in every network layer. (1 point)
14. Internet Protocol Security (IPSec) Protocol works at Layer 3 (1 point)
15. The ______ secure protocol that replaces the unsecure telnet, rlogin and rsh protocols? (1 point)
16. In a network, what are the four key areas where threats are applied? (4 points)
20. I’m searching for a firewall that acts as a go-between between and application outside the firewall, say email and another application behind the firewall and ensures that the proper protocol rules between these applications are followed. What do I need? (5 points)
21. True or False. In network security, end-to-end encryption works at the logical layer. (1 point)
22. How does my web browser establish and maintain a secure connection to a site such as amazon.com? (4 points)
23. I go on travel several times a year which requires me to take my laptop with me to do work. I often connect to wide open networks such as the one offered by hotels or some free Wi-Fi hotspots. How can I best protect my laptop when it is away from the home network? (5 points)
24. How do packet-filtering gateways control access to my network? (5 points)
25. Your boss just found out that you completed the Computer Security course at National University. This boss has a general knowledge about security but does not know a lot of specifics. His IT person has been discussing that firewalls do not necessarily screen out all of the bad traffic. What would you recommend he purchase to alert the IT staff that a network security breach has occurred. Will your recommendation alert to all breaches? (5 points)
Introducing our Online Essay Writing Services Agency, where you can confidently place orders for a wide range of academic assignments. Our reputable homework writing company specializes in crafting essays, term papers, research papers, capstone projects, movie reviews, presentations, annotated bibliographies, reaction papers, research proposals, discussions, and various other assignments. Rest assured, our content is guaranteed to be 100% original, as every piece is meticulously written from scratch. Say goodbye to concerns about plagiarism and trust us to deliver authentic and high-quality work.