Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

The official phreaker's manual

27/03/2021 Client: saad24vbs Deadline: 2 Day

Chapter 1: Exercises 1, 2, 4

Exercise 1: Assume that a security model is needed to protect information used in the class you are taking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 27 cells.

Answer: The information in the class can be present on the blackboard which could be the subject names, subject courses along with the description and presentation slide for each and every subject. The users can access the blackboard using their authenticated name and password unknown to others. We can use CNSS security model to manage the security of the information related to students in order to ensure the following:

1) Confidentiality: It means that information is accessed by only authenticates users and no unknown users can access it. This can be achieved by using individual username and password for a blackboard which unique for every student and this will ensure only the students can log in to their own accounts and access the information related to the subjects.

2) Integrity: Data should be consistent and accurate and should not be modified. The information required by the student like presentation slides, the last year examinations questions etc should be as it is the way it is loads into the systems and should not be modified by any means during its passage from system to the user.

3) Availability: Data should be available as and when it is required. Student can just login and request any information like subject content study material etc. and this should be available as soon as the user press enters depending on the kind of information he/she needs but only to the person who has the username and password belonging to the account.

4) Storage: The data should be present in the memory storage and a backup needs to be created so that if it gets deleted we can restore it .The data is easily accessible from the memory and once the student wants any information he can directly get it as data is stored on the memory of the internet database easily accessible by the unique student.

5) Transmission: The data transmission from the database to the user should be done properly without any changes to the information. It should be fast and smooth so that user gets results in the shortest possible time.

6) Processing: The processing maybe needed by student to calculate their percentage or find out the highest marks. These are supported by this model as it helps in performing calculations the way student wants.

Exercise 2: Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you?

Answer: In the context of the given question, yes I do have sensitive information saved on my computer like my financial statements, bank transaction records, passwords and some important office files which if stolen can be a risk to my privacy. This can be an easy access for the hacker to enter into my personal life and cause damage. My personal computer holds credit card numbers, bank account details, passwords, medical information, websites I have visited, personal family pictures, some private letters and all my business ideas. Basically my whole life is on my personal computer and if it fell into the wrong hands someone might use it to commit fraud against me. I will have to take action quickly to minimize the potential for the theft of my identity. I will have to close compromised credit card accounts immediately and put an initial fraud alert on my credit report. I will have to place new passwords on old and new accounts that I open. I think getting my personal information compromised would leave me very paranoid and I will be watching for signs that my information is being misused and I think at the end it will leave me feeling much violated.

Exercise 4: Search the Web for “The Official Phreaker’s Manual.” What information might help a security administrator to protect a communications system?

Answer: The Official Phreaker’s Manual before I discuss the information that might help a security administrator to protect a communications system I want to explain the word Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. Since Phone phreaking is the act of using mischievous and mostly illegal methods to avoid paying for a telecommunications invoice, order, transfer, or other service. It often involves usage of illegal boxes and machines to defeat security that is set up to avoid such tactics. This security includes “blocking networks”—networks that under certain conditions may be unable to form a transmission path from one end to the other. In general, all networks used within the Bell Systems are of the blocking type. Security administrators could benefit from studying “The Official Phreaker’s Manual” because it could allow them to better protect their communications systems. From the system administrator’s point of view, this information could reveal many common ways of finding loopholes and alternate methods around communications system security measures. The manual could also help system administrators use different approaches in implementing a more extensive security program

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Professor
Top Grade Essay
Engineering Solutions
Premium Solutions
Accounting & Finance Mentor
Writing Factory
Writer Writer Name Offer Chat
Finance Professor

ONLINE

Finance Professor

I will cover all the points which you have mentioned in your project details.

$38 Chat With Writer
Top Grade Essay

ONLINE

Top Grade Essay

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$38 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have read your project details. I can do this within your deadline.

$22 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$18 Chat With Writer
Accounting & Finance Mentor

ONLINE

Accounting & Finance Mentor

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$19 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$34 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Samsung nand flash part number decoder - Discussion questions WITH one reference per questions - Lln specialist - University of melbourne human research ethics committee - How many edges does a hexagonal prism have - Factoring trinomials of the form x2 bx c - I was born to speak all mirth and no matter - Horizontal vs vertical and conglomerate mergers - Discussion nw - National herbarium of victoria - Concept synthesis paper on personal nursing philosophy - Responses to disruptive strategic innovation - How secret messages tipped the scales answers - Fireside tire company case study - The proverbs tell us how to live life successfully - Hodder education economics answers - Medical assistant creed and code of ethics - Am i blue alice walker - Basic laboratory techniques experiment 1 report sheet answers - How are photosynthesis and cellular respiration interrelated - The two merchants of seri questions and answers - Physical Geography Research Paper - Causes of prejudice by vincent parrillo summary - Data Analysis And Business Analytics - Spotty handed villainesses techniques - Max iacopetta net worth - Ny times 301 argumentative prompts - Which layers of the earth are made primarily of rock - Why did andersen consulting change to accenture - Words that rhyme with discussion - Debut emcee script introduction - Arcadia tom stoppard act 1 - Size constancy in psychology - What is the south african government providing and to whom - Human resource - Cost of goods manufactured is equal to - Contemporary Nursing Practice - Food inc video assignment sheet answers - Sport and health tenleytown - Composition of everyday life 6th edition - A vertical integration strategy can expand the firm's range of activities - Kim Woods only - Spartiate training - How many ß-hydrogens are there in 2-chloropentane - Ezytrail stirling lx mk2 setup - Organizational behavior - Essex hash house harriers - Business, government, and society - Justice peter hely scholarship - 521 Professor reply - The hardy weinberg equation pogil activities for ap biology answers - Order # 9659 - Ridgecrest school dispute negotiation simulation - Vocabulary Strategies - Erosion no 2 mother earth laid bare - Western modernist ethical theories - Sullivan and cromwell salary scale - Labour department domestic helper guide - Attar of roses by tahira naqvi summary - Final - A moving coil galvanometer - Post adjusting entries to the t accounts problem 4 8a - Ohm's law lab report graph - Redextract n amp pcr reaction mix - The Managerial Role in Crafting and Executing Strategy - The value of a product offering is determined by the customer and varies accordingly. How does a retailer like Walmart deliver value differently than Banana Republic? - Social work field placement challenges - Puan sri esther tan - Onboarding new employees: maximizing success - 1d beam element abaqus - Kean university grading scale - How to prepare a final account in construction - Do not fold spindle or mutilate who invented this card - Marketing plan for refrigerators - Spandeck engineering s pte ltd - Assignment - Broen lab singapore pte ltd - Case study - Www ucr in gov ucrhome html - Ifrs 500 multiple choice questions - RESEARCH ARTICLE SUMMARY TABLE - Homework - Network security plan - Tactics layer ritina guard senki - Bridgewater way cycle route - Uniform motion problems worksheet - Title page of a literature review - How to write a formal analysis - God of carnage summary sparknotes - Lowest point of expected variation - The cantilevered jib crane is used to support - Foundations of Financial 4 - bound - Gastro stop how many to take - Walden university school of nursing mission and vision - Https www skillsyouneed com ls index php 325444 - Sel 710 relay manual - Clipsal smoke alarm warranty - How does an appendix work in a report - Invasive Aspergillosis - Kite runner chapter 11