IntroToSecHW1 - IS2150-Intro to Security Sept/15/09 Karan...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
IS2150-Intro to Security Karan Bhamidipati – HW1 Sept/15/09 1: Classify each of the following as a violation of confidentiality, of integrity, of availability, or of some combination thereof. a. John copies Mary’s homework. [Confidentiality] b. Paul crashes Linda’s system . [Availability, Integrity] c. Carol changes the amount of Angelo’s check from $100 to $1,000. [Integrity] d. Gina forges Roger’s signature on a deed. [Integrity] e. Rhonda registers the domain name “” and refuses to let the publishing house buys or use that domain name. [Availability] f. Jonah obtains Peter’s credit card number and has the credit card company cancel the card and replace it with another card bearing a different account number. [Confidentiality, Integrity, Availability] g. Henry spoofs Julie’s IP address to gain access to her computer. [Integrity] 4: Give an example of a situation where a compromise of confidentiality leads to compromise in integrity. A compromise of confidentiality can happen when a hacker hacks into an account and modifies the account. For example, in a banking environment a hacker can hack into any account and transfer money into his account or any other account he wants. 9: Policy restricts the use of electronic mail on a particular system to faculty and staff. Students cannot send or receive electronic mail on that host. Classify the following mechanisms as secure, precise, or broad. a. The electronic mail sending and receiving programs are disabled. [Secure] b. As each letter is sent or received, the system looks up the sender (or recipient) in a database. If that party is listed as faculty or staff, the mail is processed. Otherwise, it is rejected. (Assume that the database entries are correct.) [Precise] c. The electronic mail sending programs ask the user if he or she is a student. If so, the mail is refused. The electronic mail receiving programs are disabled.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/02/2009 for the course SIS 2150 taught by Professor Joshi during the Spring '09 term at Philadelphia.

Page1 / 3

IntroToSecHW1 - IS2150-Intro to Security Sept/15/09 Karan...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online