SHW1 - IS-2150/TEL-2810 Introduction to Security Homework 1...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
IS-2150/TEL-2810 Introduction to Security Homework 1 Sample Solution Total: 50 Points 1. [20 Points] Do the following from Chapter 1 From section 1.11, do exercises 1, 4, 9, 15 Exercise 1: Classify each of the following as a violation of confidentiality, of integrity, of availability, or of some combination thereof. a. John copies Mary’s homework. [ confidentiality ] b. Paul crashes Linda’s system. [ availability, integrity ] c. Carol changes the amount of Angelo’s check from $100 to $1,000. [ data integrity ] d. Gina forges Roger’s signature on a deed. [ integrity ] e. Rhonda registers the domain name “AddisonWesley.com” and refuses to let the publishing house buy or use that domain name. [ availability ] f. Jonah obtains Peter’s credit card number and has the credit card company cancel the card and replace it with another card bearing a different account number. [ confidentiality, integrity, availability ] g. Henry spoofs Julie’s IP address to gain access to her computer. [ source integrity ] Exercise 4: If you can get the username and password of someone’s email account (confidentiality),
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/02/2009 for the course SIS 2150 taught by Professor Joshi during the Spring '09 term at Philadelphia.

Page1 / 2

SHW1 - IS-2150/TEL-2810 Introduction to Security Homework 1...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online