How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask David L. Your Own Question

David L.
David L., Engineer
Category: Homework
Satisfied Customers: 6379
Experience:  20 years experience writing white papers, tech publications
13852270
Type Your Homework Question Here...
David L. is online now
A new question is answered every 9 seconds

Question 1. This question concerns the main security goals

This answer was rated:

Question 1. This question concerns the main security goals (confidentiality, integrity, availability). Describe a situation in which the the goal of integrity is important, but there is not a need for confidentiality.

Question 2. In a particular form of two-factor authentication, a user shows their identity by providing a password XXXXX then receiving (on their mobile phone) a text message with a number that must be entered as well. Describe an attack that would succeed despite this particular two-factor approach.

Question 3. In the past few years, a type of scam has become common, where a telephone call claims to be from Microsoft Technical Support, telling the customer that their computer has been infected by a virus, and offering to help fix the problem, see http://www.scamwatch.gov.au/content/index.phtml/itemId/792165 Write an explanation suitable for a friend who is not studying any computing courses, to help explain to them about the dangers of allowing remote access to a computer.

Question 4. If file permissions are set inappropriately, security can suffer. Suppose Fred Foolish, the Chief Security Officer of the company you work for, makes a policy that every file must have its permissions checked by a system administrator. Discuss the impact of this policy on the likelihood or extent of damage caused by an attack, and on the normal work of the organization.

Question 5. A typical password XXXXX XXXXX 8 characters long (and so can be stored in 8 bytes, or 64 bits). However, a typical key for encryption/decryption is much longer, and a key of 64 bits would not be considered secure. Explain this in terms of the difference between the way a secret is used as a password, and the way it is used as a key. Hint: what happens if an attacker takes a few months to discover the secret?
Hello,


By when do you need this completed?

Is there a length or format requirement for each answer?

Thanks,

David.
Customer: replied 3 years ago.
Hi, I need answers before this Friday. Every answer needs 100-200 characters.
Ok thanks. I will start work on it.

Thanks,

David.
Hello,

Just letting you know that I expect to post it later this afternoon/evening.

Thanks,

David.
Customer: replied 3 years ago.
ok
THIS ANSWER IS LOCKED!

You need to spend $3 to view this post. Add Funds to your account and buy credits.
David L. and 2 other Homework Specialists are ready to help you