Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

The official phreaker's manual

27/03/2021 Client: saad24vbs Deadline: 2 Day

Chapter 1: Exercises 1, 2, 4

Exercise 1: Assume that a security model is needed to protect information used in the class you are taking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 27 cells.

Answer: The information in the class can be present on the blackboard which could be the subject names, subject courses along with the description and presentation slide for each and every subject. The users can access the blackboard using their authenticated name and password unknown to others. We can use CNSS security model to manage the security of the information related to students in order to ensure the following:

1) Confidentiality: It means that information is accessed by only authenticates users and no unknown users can access it. This can be achieved by using individual username and password for a blackboard which unique for every student and this will ensure only the students can log in to their own accounts and access the information related to the subjects.

2) Integrity: Data should be consistent and accurate and should not be modified. The information required by the student like presentation slides, the last year examinations questions etc should be as it is the way it is loads into the systems and should not be modified by any means during its passage from system to the user.

3) Availability: Data should be available as and when it is required. Student can just login and request any information like subject content study material etc. and this should be available as soon as the user press enters depending on the kind of information he/she needs but only to the person who has the username and password belonging to the account.

4) Storage: The data should be present in the memory storage and a backup needs to be created so that if it gets deleted we can restore it .The data is easily accessible from the memory and once the student wants any information he can directly get it as data is stored on the memory of the internet database easily accessible by the unique student.

5) Transmission: The data transmission from the database to the user should be done properly without any changes to the information. It should be fast and smooth so that user gets results in the shortest possible time.

6) Processing: The processing maybe needed by student to calculate their percentage or find out the highest marks. These are supported by this model as it helps in performing calculations the way student wants.

Exercise 2: Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you?

Answer: In the context of the given question, yes I do have sensitive information saved on my computer like my financial statements, bank transaction records, passwords and some important office files which if stolen can be a risk to my privacy. This can be an easy access for the hacker to enter into my personal life and cause damage. My personal computer holds credit card numbers, bank account details, passwords, medical information, websites I have visited, personal family pictures, some private letters and all my business ideas. Basically my whole life is on my personal computer and if it fell into the wrong hands someone might use it to commit fraud against me. I will have to take action quickly to minimize the potential for the theft of my identity. I will have to close compromised credit card accounts immediately and put an initial fraud alert on my credit report. I will have to place new passwords on old and new accounts that I open. I think getting my personal information compromised would leave me very paranoid and I will be watching for signs that my information is being misused and I think at the end it will leave me feeling much violated.

Exercise 4: Search the Web for “The Official Phreaker’s Manual.” What information might help a security administrator to protect a communications system?

Answer: The Official Phreaker’s Manual before I discuss the information that might help a security administrator to protect a communications system I want to explain the word Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. Since Phone phreaking is the act of using mischievous and mostly illegal methods to avoid paying for a telecommunications invoice, order, transfer, or other service. It often involves usage of illegal boxes and machines to defeat security that is set up to avoid such tactics. This security includes “blocking networks”—networks that under certain conditions may be unable to form a transmission path from one end to the other. In general, all networks used within the Bell Systems are of the blocking type. Security administrators could benefit from studying “The Official Phreaker’s Manual” because it could allow them to better protect their communications systems. From the system administrator’s point of view, this information could reveal many common ways of finding loopholes and alternate methods around communications system security measures. The manual could also help system administrators use different approaches in implementing a more extensive security program

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Professor
Top Grade Essay
Engineering Solutions
Premium Solutions
Accounting & Finance Mentor
Writing Factory
Writer Writer Name Offer Chat
Finance Professor

ONLINE

Finance Professor

I will cover all the points which you have mentioned in your project details.

$38 Chat With Writer
Top Grade Essay

ONLINE

Top Grade Essay

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$38 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I have read your project details. I can do this within your deadline.

$22 Chat With Writer
Premium Solutions

ONLINE

Premium Solutions

I have read and understood all your initial requirements, and I am very professional in this task.

$18 Chat With Writer
Accounting & Finance Mentor

ONLINE

Accounting & Finance Mentor

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$19 Chat With Writer
Writing Factory

ONLINE

Writing Factory

I am known as Unrivaled Quality, Written to Standard, providing Plagiarism-free woork, and Always on Time

$34 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Merrill lynch boa merger - LDR531 Week 4 - Signature Assignment - This is our story ashley elston read online - Assignment Help - Nurses burnout during a pandemic - Capitulo 3a realidades 1 answers - Coke and pepsi book - Opposite of still life - Gll clapham leisure centre - Rocky mountain chocolate factory case solution - Claireece precious jones still alive - Cyber Security - Ascia anaphylaxis e training for pharmacists - I need help with homework - Harmonizer is a maintenance role in groups - Stand by me chris - A patient is admitted with chest pain following a visit with her family health care provider. Using the “OLD CART” method of gathering pertinent data, discuss the type of questions you will be asking this patient in relation to her chest pain. - Report SEC 10-K - Anatomical landmarks of edentulous maxilla - Speech Introduction - Klein and moeschberger survival analysis solutions - How to do trigonometry word problems - Anaphylaxis management plan childcare - 8 pints is how many gallons - Discussion Post - Electric field hockey activity worksheet answers - Ukfpo sjt practice paper - Notre dame student centre - The mousetrap character analysis - 250 words minimum. - Effect of cold working on mechanical properties - Act 2 scene 1 macbeth soliloquy analysis - An isentropic steam turbine processes - Example of completed r40 form - What is the stage gate process for new product development - Tina jones neurological assessment - Gary pye woodturning tools - Curtin university maths enrichment - The rich eat three full meals - Triple c camp charlottesville review - Analysis of truss by method of section - Change Agents in the Change Management Process - Swinburne cover sheet word - Big boeing fmc user's guide - From which direction does autocad start measuring angles - Amex membership rewards ascent - The bad citizen in classical athens - Nuig exam results login - Sound card interface schematic - Purchase Evaluation - Healthcare Management - Lucy's underground she's got a mouth to feed - Sports training program template - Power Point Presentation - Lactic acid fermentation khan academy - Offer and acceptance form - Norton anthology of english literature volume a pdf - Wwe swot analysis - Neptune's necklace physiological adaptations - The reluctant fundamentalist changez quotes - Bitcoin Economics - 741 op amp equivalent - Transition to Graduate Study - Lyrics of where is the love - Dr sachin gupta neurologist - Simsimple - Laboratory report 26 meninges and spinal cord answers - 6/3-1 - Cultural competence early childhood - Janus products inc is a merchandising company - Hammer beam truss analysis - Tertia optica area of the brain - Discussion 3 - 2 - Circuit diagram of a torch - Apocalypse now workprint dvd - Cobalt molybdenum catalyst density - Food temperature guidelines scotland - Given the following data ca s 2c graphite - Discussion - Information system management case studies - Osu hr phone number - Polythene rod and cloth - Building shared services at rr communications case study - Cauti capstone project - Econ - Ez pass boston ma - ET WK6 paper - Billy blue college of design review - Language and Speech Disorder Matrix - Michelle sanson statutory interpretation oxford university press 2nd ed 2016 - Local lion boone north carolina - Practical connection - Cause and Effect and advantages - Leccion 4 contextos correcto o incorrecto - What is the definition of inherent risk - William f baxter addresses environmental ethics by noting - Butterfield's phosphate buffered dilution water - Research Proposal - A christmas carol test