Ha1_11sol - CIS 4360 Introduction to Computer Security Home Assignment 1 Fall 2011 — SOLUTIONS Due date This concerns the basic requirements for

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CIS 4360 Introduction to Computer Security Home Assignment 1, Fall 2011 — SOLUTIONS Due date: Sept 13, 2011 This concerns the basic requirements for Computer Security. Examples taken from Matt Bishop’s Introduction to Computer Security, Addison-Wesley. 1. Classify each of the following as a violation of Confidentiality ( C ), Integrity ( I ), Availability ( A ), or of some combination of these. (a) John copies Mary’s homework. ( C ) (b) Paul crashes Linda’s system. ( A ) (c) Carol changes the amount of Angelo’s check from $100 to $1,000. ( I ) (d) Gina forges Rogers signature on a deed. ( I ) (e) Rhonda registers the domain name “AddisonWesley.com” and refuses to let the pub- lishing house buy or use that domain name. ( A ) (f) Jonah obtains Peter’s credit card number and has the credit card company cancel the card and replace it with another card bearing a different account number. ( A ), ( I ) (g) Henry spoofs Julie’s IP address to gain access to her computer. ( C ),(...
View Full Document

This document was uploaded on 12/04/2011.

Page1 / 2

Ha1_11sol - CIS 4360 Introduction to Computer Security Home Assignment 1 Fall 2011 — SOLUTIONS Due date This concerns the basic requirements for

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online