Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

The official phreaker's manual

27/03/2021 Client: saad24vbs Deadline: 2 Day

Chapter 1: Exercises 1, 2, 4

Exercise 1: Assume that a security model is needed to protect information used in the class you are taking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 27 cells.

Answer: The information in the class can be present on the blackboard which could be the subject names, subject courses along with the description and presentation slide for each and every subject. The users can access the blackboard using their authenticated name and password unknown to others. We can use CNSS security model to manage the security of the information related to students in order to ensure the following:

1) Confidentiality: It means that information is accessed by only authenticates users and no unknown users can access it. This can be achieved by using individual username and password for a blackboard which unique for every student and this will ensure only the students can log in to their own accounts and access the information related to the subjects.

2) Integrity: Data should be consistent and accurate and should not be modified. The information required by the student like presentation slides, the last year examinations questions etc should be as it is the way it is loads into the systems and should not be modified by any means during its passage from system to the user.

3) Availability: Data should be available as and when it is required. Student can just login and request any information like subject content study material etc. and this should be available as soon as the user press enters depending on the kind of information he/she needs but only to the person who has the username and password belonging to the account.

4) Storage: The data should be present in the memory storage and a backup needs to be created so that if it gets deleted we can restore it .The data is easily accessible from the memory and once the student wants any information he can directly get it as data is stored on the memory of the internet database easily accessible by the unique student.

5) Transmission: The data transmission from the database to the user should be done properly without any changes to the information. It should be fast and smooth so that user gets results in the shortest possible time.

6) Processing: The processing maybe needed by student to calculate their percentage or find out the highest marks. These are supported by this model as it helps in performing calculations the way student wants.

Exercise 2: Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you?

Answer: In the context of the given question, yes I do have sensitive information saved on my computer like my financial statements, bank transaction records, passwords and some important office files which if stolen can be a risk to my privacy. This can be an easy access for the hacker to enter into my personal life and cause damage. My personal computer holds credit card numbers, bank account details, passwords, medical information, websites I have visited, personal family pictures, some private letters and all my business ideas. Basically my whole life is on my personal computer and if it fell into the wrong hands someone might use it to commit fraud against me. I will have to take action quickly to minimize the potential for the theft of my identity. I will have to close compromised credit card accounts immediately and put an initial fraud alert on my credit report. I will have to place new passwords on old and new accounts that I open. I think getting my personal information compromised would leave me very paranoid and I will be watching for signs that my information is being misused and I think at the end it will leave me feeling much violated.

Exercise 4: Search the Web for “The Official Phreaker’s Manual.” What information might help a security administrator to protect a communications system?

Answer: The Official Phreaker’s Manual before I discuss the information that might help a security administrator to protect a communications system I want to explain the word Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. Since Phone phreaking is the act of using mischievous and mostly illegal methods to avoid paying for a telecommunications invoice, order, transfer, or other service. It often involves usage of illegal boxes and machines to defeat security that is set up to avoid such tactics. This security includes “blocking networks”—networks that under certain conditions may be unable to form a transmission path from one end to the other. In general, all networks used within the Bell Systems are of the blocking type. Security administrators could benefit from studying “The Official Phreaker’s Manual” because it could allow them to better protect their communications systems. From the system administrator’s point of view, this information could reveal many common ways of finding loopholes and alternate methods around communications system security measures. The manual could also help system administrators use different approaches in implementing a more extensive security program

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Professor
Top Grade Essay
Engineering Solutions
Premium Solutions
Accounting & Finance Mentor
Writing Factory
Writer Writer Name Offer Chat
Finance Professor

ONLINE

Finance Professor

I will cover all the points which you have mentioned in your project details.

$38 Chat With Writer
Top Grade Essay

ONLINE

Top Grade Essay

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$38 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have read your project details. I can do this within your deadline.

$22 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$18 Chat With Writer
Accounting & Finance Mentor

ONLINE

Accounting & Finance Mentor

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$19 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$34 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Promises like pie crust christina rossetti - How to dispose of citristrip - Secondary sector definition geography - Repco taren point contact - Asthma soap note - Assignment: Evidence-Based Practice and the Quadruple Aim - Two models used for multigenerational family health histories - Business policy and strategic management questions and answers pdf - Biosand filter flow rate - Organizational communication - G by john berger pdf - Help needed - Glenwood dental centre glenrothes - What ice cream flavor would you be - Amd processor warranty rma - Airtran 297 anatomy of an urban legend - Firo b test questions pdf - Angle of 6 sided polygon - Blood vessel, blood pressure and blood components. - Case study daimler chrysler merger - Data Mining - Step Smart Case - Www cie org uk - Faisalabad textile industry list - Yager group pyramid scheme - Tupperware replacement parts australia - What is the confidence interval for the population mean muμ - Hells angels clubhouse coquitlam - English essay About arguing a policy - How to write a weekly report for internship - Bernhard rapid relief 1000 - Compute the selling price per composite unit - 14 8 challenge problem accounting - Silver company makes a product - Essay writing - Macbeth act 3 graphic organizer - When was caged bird written - 1259666093 - Journal entry on shakespeare - Journal entry for warranty expense - Hydrogen peroxide decomposes according to the equation - Water potential and osmosis worksheet answers - Jrp online portal login - Britney spears guide to semiconductor physics - Select the guiding questions of reader response criticism - Benchmark Southwest Transit - Activity 2.3 fill in the blank fat tom answers - I need this done as soon as possible - Air force virtual education center - WK7-1006 - Bed bath and beyond target market - Non locomotor skills in basketball - The shark net book - The learning place student login - Types of reimbursement models in healthcare - English Composition - Three activities that comprise strategy evaluation - Data structure programs in java pdf - The blind side movie viewing guide - Types of Organizational Change - Discussion Question - Lewis dot structure formal charge - Similarities between print and broadcast media - Accounting - And write a summary of more than 1000 words. - Market mapping business studies - Geographic pay differentials calculator - Cargo imp message formats - Consensus organizing - Elite realty acts as an agent in buying - How to read minitab output - Carnegie stages of human development images - Broadening your perspective 11 2 - Comodo endpoint security ended prematurely - Terminal points of a unit circle - Understanding and managing organizational behavior 6th edition powerpoint - Westongrove surgery aston clinton - In a common size income statement the 100 figure is - Health Care Career Essay - Diameter of the sun in au - Pressure in solids worksheet - Library Assignment / Case Scenario - Zinc reading labs answer key - Different types of writing - Exercise 3 sentence completion lesson 1 answer key - InfoTech in a Global Economy - Il tempo se ne va lyrics english - A slumber did my spirit seal - Aqa french vocab list gcse 2016 - Nathan campus griffith university - According to the attraction selection attrition theory job applicants - Life in the future informative speech - Paper Needed November 6th!!! Original Work Only!! No Plagiarism!!! - University of virginia health system case study solution - Change manager as director - Phoenix tears foundation janet sweeney - Carls jr call of duty - Cell organelles and their functions worksheet - What are the 4 types of maps - Kirkpatrick’s Taxonomy