Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

The official phreaker's manual

27/03/2021 Client: saad24vbs Deadline: 2 Day

Chapter 1: Exercises 1, 2, 4

Exercise 1: Assume that a security model is needed to protect information used in the class you are taking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 27 cells.

Answer: The information in the class can be present on the blackboard which could be the subject names, subject courses along with the description and presentation slide for each and every subject. The users can access the blackboard using their authenticated name and password unknown to others. We can use CNSS security model to manage the security of the information related to students in order to ensure the following:

1) Confidentiality: It means that information is accessed by only authenticates users and no unknown users can access it. This can be achieved by using individual username and password for a blackboard which unique for every student and this will ensure only the students can log in to their own accounts and access the information related to the subjects.

2) Integrity: Data should be consistent and accurate and should not be modified. The information required by the student like presentation slides, the last year examinations questions etc should be as it is the way it is loads into the systems and should not be modified by any means during its passage from system to the user.

3) Availability: Data should be available as and when it is required. Student can just login and request any information like subject content study material etc. and this should be available as soon as the user press enters depending on the kind of information he/she needs but only to the person who has the username and password belonging to the account.

4) Storage: The data should be present in the memory storage and a backup needs to be created so that if it gets deleted we can restore it .The data is easily accessible from the memory and once the student wants any information he can directly get it as data is stored on the memory of the internet database easily accessible by the unique student.

5) Transmission: The data transmission from the database to the user should be done properly without any changes to the information. It should be fast and smooth so that user gets results in the shortest possible time.

6) Processing: The processing maybe needed by student to calculate their percentage or find out the highest marks. These are supported by this model as it helps in performing calculations the way student wants.

Exercise 2: Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you?

Answer: In the context of the given question, yes I do have sensitive information saved on my computer like my financial statements, bank transaction records, passwords and some important office files which if stolen can be a risk to my privacy. This can be an easy access for the hacker to enter into my personal life and cause damage. My personal computer holds credit card numbers, bank account details, passwords, medical information, websites I have visited, personal family pictures, some private letters and all my business ideas. Basically my whole life is on my personal computer and if it fell into the wrong hands someone might use it to commit fraud against me. I will have to take action quickly to minimize the potential for the theft of my identity. I will have to close compromised credit card accounts immediately and put an initial fraud alert on my credit report. I will have to place new passwords on old and new accounts that I open. I think getting my personal information compromised would leave me very paranoid and I will be watching for signs that my information is being misused and I think at the end it will leave me feeling much violated.

Exercise 4: Search the Web for “The Official Phreaker’s Manual.” What information might help a security administrator to protect a communications system?

Answer: The Official Phreaker’s Manual before I discuss the information that might help a security administrator to protect a communications system I want to explain the word Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. Since Phone phreaking is the act of using mischievous and mostly illegal methods to avoid paying for a telecommunications invoice, order, transfer, or other service. It often involves usage of illegal boxes and machines to defeat security that is set up to avoid such tactics. This security includes “blocking networks”—networks that under certain conditions may be unable to form a transmission path from one end to the other. In general, all networks used within the Bell Systems are of the blocking type. Security administrators could benefit from studying “The Official Phreaker’s Manual” because it could allow them to better protect their communications systems. From the system administrator’s point of view, this information could reveal many common ways of finding loopholes and alternate methods around communications system security measures. The manual could also help system administrators use different approaches in implementing a more extensive security program

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Professor
Top Grade Essay
Engineering Solutions
Premium Solutions
Accounting & Finance Mentor
Writing Factory
Writer Writer Name Offer Chat
Finance Professor

ONLINE

Finance Professor

I will cover all the points which you have mentioned in your project details.

$38 Chat With Writer
Top Grade Essay

ONLINE

Top Grade Essay

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$38 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have read your project details. I can do this within your deadline.

$22 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$18 Chat With Writer
Accounting & Finance Mentor

ONLINE

Accounting & Finance Mentor

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$19 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$34 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Business - The system for grouping businesses that grew out of the nafta accord is known as the: - Statue of poseidon neptune alongside dolphin - Hellenistic Anatomy and Physiology - Romeo's friend who tries to make peace - Jean michel basquiat horn players - Vce chem study design - Thermo king alarm code 89 - Asian art dorinda neave download - What is atom economy - Safety Engineer For NEBOSH IGC1 exam SCENARIO - Future wheel teaching method - Aftermath by henry wadsworth longfellow analysis - Citrohan house le corbusier - Database development life cycle with example - Radiolab podcast henrietta's tumor homework assignment - Cask of amontillado essay prompts - I m not scared themes - Carl rogers therapy style - Capital coca cola - How to measure cell size - Effective Speaking Discussion - Discussion 2: Contemplating Your Future - How to encrypt a file using 7zip - Genie s40 parts manual - Gator wilderness camp school - Cmit 425 risk assessment paper - Cliff longshaw driving instructor - Kiwisaver withdrawal application form - Difference between business idea and business opportunity - Need a discussion answer and replies for two discussions - Spirulina dosage for birds - The work in process inventory account of a manufacturing corporation - Abb irc5 controller manual - Case study - The equilibrium constant kc is 9.8 x 10 5 - Student school Experience - Proj Assessment 2 (KIm Woods) Due in 3 days - Tom mccahill cause of death - Guide vanes in francis turbine - Similarities and differences between job order costing and process costing - Health and skill related components of fitness - Enterprise blockchain development with hyperledger fabric and composer pdf - Elijah of buxton timeline - Cystoscopy urethral dilation and hydrodilation - Limitation of an experiment - Ansoff matrix example nestle - What does owasp stand for - Cherokee inc is a merchandiser that provided the following - Skype for business codec bandwidth - Zappos culture book 2019 pdf - Check resmed 30 90w power supply - Write observation - Design a charge amplifier for a piezoelectric sensor - No plagiarism/ must be original/ scholarly resources 2015 - How does dilution affect ph - Moonee valley waste transfer - For the first time and forever - Butl- Federal Government - Cultural identifiers - Higher chemistry specimen paper - Bunsen burner yellow flame - Inscriptions on the three caskets - Week 2 Discussion - Ikea challenges in india - The perfect picture james thom pdf - Assi - Cajas de carton analysis questions - Gopro be a hero marketing campaign - Math 221 devry week 3 quiz - PLAGIARISM FREE "A" WORK - Chapter 10 motivating employees - Continuing payroll problem a - Boogie shoes remix trick daddy - Grim dawn turtle shell - Pearson and gallagher 1983 citation - Instruction set of intel i7 - Acolyte or rejector - Adrienne rich twenty one love poems - Melaleuca claret tops bunnings - Differences in male and female communication informative speech - Uwa bachelor of biomedical science - Cds gross pollutant trap - Final Paper - Sheffield hallam university library - Pronoun antecedent agreement exercises - Triethylene glycol msds dow - Discussion - French Class - Darlington credit union login - Shadow health chest pain documentation - Green top guidelines pcos - Bruce dawe the wholly innocent - Global marketing warren keegan 9th edition pdf - Global productivity, economic growth and inflation - At a construction site a pipe wrench struck the ground - Spat r phonological assessment - Coefficient of linear expansion copper - Thesis and Outline Poem WWI - Osmium weight per cubic foot