Midterm_Vijay

Midterm_Vijay - CSC 607 EXAM I August 2010 NAME: VIJAY...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CSC 607 NAME: VIJAY KURUGANTY EXAM I DATE: 08/17/2010 August 2010 STUDENT ID: 021479349 1. Describe the four goals of computer/network security. Ans: Computer/ Network Security have four important goals of any computer -related system. These four goals are as follows: a. Confidentiality b. Integrity c. Availability d. Non- Repudiation. Confidentiality: This ensures that the computer-related assets are secured and accessed only by authorized parties. Only the authorized people or systems can access protected data. In simple terms confidentiality means “access restricted to authorized people”. This means only those who should have access to something will actually get that access. This "access," does not mean only reading but also viewing, printing, editing or simply knowing that a particular asset exists. Confidentiality is the security property we understand best because its meaning is narrower than the other two. Confidentiality is sometimes called secrecy or privacy. Integrity: Integrity means the data or assets can be modified only by authorized parties or people only in authorized ways. Modifications can be done in a précised, accurate, meaningful way only by the authorized people. In this context, modification includes writing, changing, changing status, deleting, and creating, etc. Availability: The name availability itself indicates that resources are availability at a particular time. In simple this means accessible to authorized persons at appropriate times. In other words, if some person or system has legitimate access to a particular set of objects, that access should not be prevented. For this reason, availability is sometimes known by its opposite, denial of service. Non-Repudiation: The sender can never accept or refuse having the sent data.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
2. Name some potential weak points in National University’s network and computing system specifically with our classroom computers. Ans: The weak points in National University network and computing system specifically in classroom computers are as follows: a. Data in the classroom computers are accessible to any student, staff, and faculty. b. Data in classroom computers can be easily accessed by authorized (N.U) or unauthorized (Non N.U) persons. c. Data can be modified and transferred from one computer to another computer through means of pen drive, external hard disk, cd’s, dvd’s, floppy, etc effects system with viruses. d. Data is available to everyone. e. No computer is protected with pass code. f. There are many vulnerabilities and threats. 3. Provide me some recommendations on how we can better overcome some of the weaknesses you mention in question 2. Ans: To overcome these weak points mentioned in the question 2, here are some recommendations mentioned below: a. The classroom computers must be accessed by student only, by providing unique id and password for each and every student. b.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/29/2011 for the course CSC 607 taught by Professor Dr.pradipp.dey during the Spring '11 term at National.

Page1 / 10

Midterm_Vijay - CSC 607 EXAM I August 2010 NAME: VIJAY...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online