This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: CIS 4360 Introduction to Computer Security Home Assignment 1, Fall 2011 — SOLUTIONS Due date: Sept 13, 2011 This concerns the basic requirements for Computer Security. Examples taken from Matt Bishop’s Introduction to Computer Security, Addison-Wesley. 1. Classify each of the following as a violation of Confidentiality ( C ), Integrity ( I ), Availability ( A ), or of some combination of these. (a) John copies Mary’s homework. ( C ) (b) Paul crashes Linda’s system. ( A ) (c) Carol changes the amount of Angelo’s check from $100 to $1,000. ( I ) (d) Gina forges Rogers signature on a deed. ( I ) (e) Rhonda registers the domain name “AddisonWesley.com” and refuses to let the pub- lishing house buy or use that domain name. ( A ) (f) Jonah obtains Peter’s credit card number and has the credit card company cancel the card and replace it with another card bearing a different account number. ( A ), ( I ) (g) Henry spoofs Julie’s IP address to gain access to her computer. ( C ),(...
View Full Document
This document was uploaded on 12/04/2011.
- Fall '09
- Computer Security