66362-CompSecSol_ch13-24

66362-CompSecSol_ch13-24 - S OLUTIONS M ANUAL C OMPUTER S...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: S OLUTIONS M ANUAL C OMPUTER S ECURITY P RINCIPLES AND P RACTICE F IRST E DITION C HAPTERS 13 - 24 W ILLIAM S TALLINGS L AWRIE B ROWN Copyright 2008: William Stallings-2- 2008 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author. Selected solutions may be shared with students, provided that they are not available, unsecured, on the Web.-3- N OTICE This manual contains solutions to the review questions and homework problems in Computer Security: Principles and Practice . If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to ws@shore.net. An errata sheet for this manual, if needed, is available at http://www.box.net/public/ig0eifhfxu . File name is S-CompSec-mmyy W.S.-4- TABLE OF CONTENTS Chapter 13: Physical and Infrastructure Security.........................................................5 Chapter 14: Human Factors.............................................................................................8 Chapter 15: Security Auditing.......................................................................................11 Chapter 16: IT Security Management and Risk Assessment.....................................14 Chapter 17: IT Security Controls, Plans, and Procedures..........................................20 Chapter 18: Legal and Ethical Aspects.........................................................................25 Chapter 19: Symmetric Encryption and Message Confidentiality...........................30 Chapter 20: Public-Key Cryptography and Message Authentication.....................38 Chapter 21: Internet Security Protocols and Standards.............................................41 Chapter 22: Internet Authentication Applications.....................................................45 Chapter 23: Linux Security.............................................................................................48 Chapter 24: Windows Vista Security............................................................................52-5- A A NSWERS TO NSWERS TO Q Q UESTIONS UESTIONS 13.1 (1) Room temperature too hot or too cold for equipment. (2) Internal equipment temperature too hot. (3) Humidity too high or too low. 13.2 The direct threat is the damage caused by the fire itself. The indirect threats are from heat, release of toxic fumes, water damage from fire suppression, and smoke damage. 13.3 Undervoltage, overvoltage, and noise. 13.4 Dealing with this problem is primarily a matter of having environmental-control equipment of appropriate capacity and appropriate sensors to warn of thresholds being exceeded. Beyond that, the principal requirement is the maintenance of a power supply....
View Full Document

Page1 / 54

66362-CompSecSol_ch13-24 - S OLUTIONS M ANUAL C OMPUTER S...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online