{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

66362-CompSecSol_ch13-24

66362-CompSecSol_ch13-24 - SOLUTIONS MANUAL COMPUTER...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
S OLUTIONS M ANUAL C OMPUTER S ECURITY P RINCIPLES AND P RACTICE F IRST E DITION C HAPTERS 13 - 24 W ILLIAM S TALLINGS L AWRIE B ROWN Copyright 2008: William Stallings
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
-2- © 2008 by William Stallings All rights reserved. No part of this document may be reproduced, in any form or by any means, or posted on the Internet, without permission in writing from the author. Selected solutions may be shared with students, provided that they are not available, unsecured, on the Web.
Background image of page 2
-3- N OTICE This manual contains solutions to the review questions and homework problems in Computer Security: Principles and Practice . If you spot an error in a solution or in the wording of a problem, I would greatly appreciate it if you would forward the information via email to [email protected] An errata sheet for this manual, if needed, is available at http://www.box.net/public/ig0eifhfxu . File name is S-CompSec-mmyy W.S.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
-4- TABLE OF CONTENTS Chapter 13: Physical and Infrastructure Security ......................................................... 5 Chapter 14: Human Factors ............................................................................................. 8 Chapter 15: Security Auditing ....................................................................................... 11 Chapter 16: IT Security Management and Risk Assessment ..................................... 14 Chapter 17: IT Security Controls, Plans, and Procedures .......................................... 20 Chapter 18: Legal and Ethical Aspects ......................................................................... 25 Chapter 19: Symmetric Encryption and Message Confidentiality ........................... 30 Chapter 20: Public-Key Cryptography and Message Authentication ..................... 38 Chapter 21: Internet Security Protocols and Standards ............................................. 41 Chapter 22: Internet Authentication Applications ..................................................... 45 Chapter 23: Linux Security ............................................................................................. 48 Chapter 24: Windows Vista Security ............................................................................ 52
Background image of page 4
-5- A A NSWERS TO NSWERS TO Q Q UESTIONS UESTIONS 13.1 (1) Room temperature too hot or too cold for equipment. (2) Internal equipment temperature too hot. (3) Humidity too high or too low. 13.2 The direct threat is the damage caused by the fire itself. The indirect threats are from heat, release of toxic fumes, water damage from fire suppression, and smoke damage. 13.3 Undervoltage, overvoltage, and noise. 13.4 Dealing with this problem is primarily a matter of having environmental-control equipment of appropriate capacity and appropriate sensors to warn of thresholds being exceeded. Beyond that, the principal requirement is the maintenance of a power supply. 13.5 1. Choice of site to minimize likelihood of disaster. Few disastrous fires originate in a well-protected computer room or IS facility. The IS area should be chosen to minimize fire, water, and smoke hazards from adjoining areas. Common walls with other activities should have at least a one-hour fire-protection rating. 2. Air conditioning and other ducts designed so as not to spread fire. There are standard guidelines and specifications for such designs. 3. Positioning of equipment to minimize damage. 4. Good housekeeping. Records and flammables must not be stored in the IS area. Tidy installation if IS equipment is crucial. 5. Hand-operated fire extinguishers readily available, clearly marked, and regularly tested.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}