Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

The official phreaker's manual

27/03/2021 Client: saad24vbs Deadline: 2 Day

Chapter 1: Exercises 1, 2, 4

Exercise 1: Assume that a security model is needed to protect information used in the class you are taking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 27 cells.

Answer: The information in the class can be present on the blackboard which could be the subject names, subject courses along with the description and presentation slide for each and every subject. The users can access the blackboard using their authenticated name and password unknown to others. We can use CNSS security model to manage the security of the information related to students in order to ensure the following:

1) Confidentiality: It means that information is accessed by only authenticates users and no unknown users can access it. This can be achieved by using individual username and password for a blackboard which unique for every student and this will ensure only the students can log in to their own accounts and access the information related to the subjects.

2) Integrity: Data should be consistent and accurate and should not be modified. The information required by the student like presentation slides, the last year examinations questions etc should be as it is the way it is loads into the systems and should not be modified by any means during its passage from system to the user.

3) Availability: Data should be available as and when it is required. Student can just login and request any information like subject content study material etc. and this should be available as soon as the user press enters depending on the kind of information he/she needs but only to the person who has the username and password belonging to the account.

4) Storage: The data should be present in the memory storage and a backup needs to be created so that if it gets deleted we can restore it .The data is easily accessible from the memory and once the student wants any information he can directly get it as data is stored on the memory of the internet database easily accessible by the unique student.

5) Transmission: The data transmission from the database to the user should be done properly without any changes to the information. It should be fast and smooth so that user gets results in the shortest possible time.

6) Processing: The processing maybe needed by student to calculate their percentage or find out the highest marks. These are supported by this model as it helps in performing calculations the way student wants.

Exercise 2: Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you?

Answer: In the context of the given question, yes I do have sensitive information saved on my computer like my financial statements, bank transaction records, passwords and some important office files which if stolen can be a risk to my privacy. This can be an easy access for the hacker to enter into my personal life and cause damage. My personal computer holds credit card numbers, bank account details, passwords, medical information, websites I have visited, personal family pictures, some private letters and all my business ideas. Basically my whole life is on my personal computer and if it fell into the wrong hands someone might use it to commit fraud against me. I will have to take action quickly to minimize the potential for the theft of my identity. I will have to close compromised credit card accounts immediately and put an initial fraud alert on my credit report. I will have to place new passwords on old and new accounts that I open. I think getting my personal information compromised would leave me very paranoid and I will be watching for signs that my information is being misused and I think at the end it will leave me feeling much violated.

Exercise 4: Search the Web for “The Official Phreaker’s Manual.” What information might help a security administrator to protect a communications system?

Answer: The Official Phreaker’s Manual before I discuss the information that might help a security administrator to protect a communications system I want to explain the word Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. Since Phone phreaking is the act of using mischievous and mostly illegal methods to avoid paying for a telecommunications invoice, order, transfer, or other service. It often involves usage of illegal boxes and machines to defeat security that is set up to avoid such tactics. This security includes “blocking networks”—networks that under certain conditions may be unable to form a transmission path from one end to the other. In general, all networks used within the Bell Systems are of the blocking type. Security administrators could benefit from studying “The Official Phreaker’s Manual” because it could allow them to better protect their communications systems. From the system administrator’s point of view, this information could reveal many common ways of finding loopholes and alternate methods around communications system security measures. The manual could also help system administrators use different approaches in implementing a more extensive security program

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Professor
Top Grade Essay
Engineering Solutions
Premium Solutions
Accounting & Finance Mentor
Writing Factory
Writer Writer Name Offer Chat
Finance Professor

ONLINE

Finance Professor

I will cover all the points which you have mentioned in your project details.

$38 Chat With Writer
Top Grade Essay

ONLINE

Top Grade Essay

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$38 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have read your project details. I can do this within your deadline.

$22 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$18 Chat With Writer
Accounting & Finance Mentor

ONLINE

Accounting & Finance Mentor

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$19 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$34 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Example of a speech outline in apa format - Star wars episode 1 full movie free youtube - Evolution of nursing education - Encompass home health hattiesburg ms - Little darlings rock and roll palace - Brutus internal conflict quotes - School Health Occupational Health - Lubricants inc produces a special kind - Essex hash house harriers - Aws config supported resources - Article Critique - How to write a positionality paper - Magill senior citizens hall - Dr chris conradie cardiologist - Cleveland board of education v lafleur - Letter e under microscope 100x - Which statement below describes a variable cost - Political science 330 - Inset smartart style - Discussion Topic Ch 4 - Leisure lakes bikes cheltenham - Answer question with 500 words - Hazlewood act gpa requirements - Discussion - Exp 105 personal dimensions of education - List of apprenticeships wa - Select a nurse theorist and write a paper describing the background of the theorist, the theory, and its application to nursing practice. - Amaretto and nut allergies - Brandon king the american dream essay - Essbase report script level 0 - Boehm incorporated is expected to pay - Andy griffith emma - Business Intelligence (Disc) - Which of the following statements best describes scientific research - Pampered pets hotel woodbridge - Gigo in nursing - Dibenzalacetone density - Absent from school email - Industrial technology graphics major project - CS - Sociology W.E.B - They say i say chapter 5 pdf - Body ritual among the nacirema answers - 365 project part - 3par file controller v3 installation guide - Lippitts change theory model - Is happy a verb - Healthcare quality book 3rd edition pdf - Is bob evans ketchup heinz - Penner medical products case study solution - Strategic management formulation implementation and control 12th edition - Molecular formula of benzene - Gauge to meter conversion - Essay using gibbs reflective cycle - As chemistry energetics questions - Training needs analysis case study - They say i say online - Principles of management chapter 5 ppt - Two discussion (econ and physics) - Discussion - Study guide and intervention trigonometry - Business plan questions checklist - Is weetabix good for weight loss - Why are decomposers important - Electromagnetic induction numericals with solution - Human resource quiz - Turnaround at the preston plant - Personal experience speech - Abb 11kv switchgear specification - Hobie 16 sail numbers - Case study 2 collaboration systems at isuzu australia limited - Walt disney company strategic goals - Four things to look for when proofreading weegy - Decision making in communities cafs - 25 myrtle road canterbury - You are the chief financial officer for a firm that sells digital music players - Best buy geek squad topeka ks - St thomas university fnp reviews - San francisco death records search - 192 168 1 48 - Operational excellence refers to companies that ________. - Blue sky thinking meaning - Local store marketing guide - Sweet paradise put up a parking lot lyrics - How are informative reports different from analytical reports - Nutrition and wellness changes in adults - Essentials of sociology george ritzer 2nd edition pdf - Resspond to classmates discussin - Unsuccessful candidates crossword clue - The green thumb gardener worksheet answers - Waren sports supply general journal 2017 - Experiment 4 projectile motion lab report - Discussion Board: Purpose and process of Job analysis - Army blc sharp essay - Econ 214 exam 2 - Bdawk6paper - I nedd help - Chemical hair texturizers temporarily raise the ph - A long walk to water chapter 18 questions - Shanghai baoqi baby bike seat