Unit 3 Discussion 1 - Access Control Models
Shovels and Shingles: I would use Discretionary Access Controls (DAC). Since the business is small,
consisting of only twelve computers, and not in need of high security measures, it would be the easiest
CREATE VIEW v_entry
SELECT a. studregno, a. studname, a. course, b. hostname, b.hostno, c. fee,
c.feepaid, c. feebalance, d. grade, d. class
FROM dbo.students a INNER JOIN dbo.hostels b ON a.studregno =
INNER JOIN dbo.finance c
TRANSACTIONS MANAGEMENT AND CONCURRENCY CONTROL
A transaction is a series of actions carried out by a single user or application program, which
must be treated as a single logical unit of work. It results from the execution of a user program
Ethernet Networking and Data Encapsulation
Ethernet is a contention-based media access method that allows all hosts on a network to
share the same links bandwidth.
Collision domain: refers to a network scenario wherein one device sends a frame out on a
SCS 437 Information Systems Applications Sit-in CAT
1. Compare and contrast computer and Human Processing systems
Just like a computer, the human mind
takes in information, organizes and
stores it to be retrieved at a l
SCHOOL OF COMPUTING AND INFORMATICS
DEPARTMENT OF COMPUTER SCIENCE AND TECHNOLOGY
COURSE: INFORMATION SYSTEMS SECURITY
TAKE AWAY-ASSIGNMENT 1
1 (a) Data Encryption Standard
It is a block cipher system which transforms 64-bit data blocks under a 56-bit sec
1. ARITHMETIC CIRCUITS
Performance of arithmetic operations is one essential function of most computers
and calculators. All these operations are performed in the arithmetic unit of a
computer, where logic gates and flip-flops are combine
a. Distinguish transposition cipher from substitution cipher
Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. The Caesar
Cipher was an early substitution cipher. In the Caesar Cipher, each character is shift
What is Information Security really about?
Information security is about keeping data private. It involves preventing hackers from breaking
into a computer, preventing denial of service attacks against web servers, preventing
unauthorized modification of
A cryptographic technique that seeks to obscure the statistical structure of the plaintext by spreading out
the influence of each individual plaintext digit over many cipher text digits.
A cryptographic technique that seeks to make the
Unit 3 Assignment 1 - Remote Access Control Policy Definition
Richman Investments must hold users responsible for what they do on the system. Log files can be used
to detect, prevent, or monitor access to the system. Due to all the differen
Unit 10 Assignment 2 - Small-to Medium-Sized Business Analysis
Meager Media has stores in several cities across the U.S. and is planning to bring its inventory online.
The company will need to support a credit card transaction processing and e-commerce We
Unit 9 Assignment 1 - Match Key Terms
1. Backdoor-An undocumented or unauthorized entry that bypasses normal authentication
2. Cracker-A malicious system intruder who illegally enters and damages systems.
3. Worm-Self-replicating software program
Unit 7 Assignment 2 - Design an Encryption Strategy
Richman Investment needs a new enterprise encryption strategy. This is for a more secure network.
They want to expand to 10,000 employees both in the United States and in foreign countries. Richman
Unit 4 Assignment 1 - Enhance an Existing IT Security Policy Framework
This document is designed to provide definition of the standards for connecting remotely to Richman
Investments network outside of the companys direct network connection. The standards
Unit 4 Assignment 2 - Acceptable Use Policy (AUP) Definition
I am a network intern at Richman Investments. My supervisor has asked me to make an Acceptable Use
Policy for our company because one of our employees infected our server with a vi
Unit 9 Assignment 2 - Summary Report on a Malicious Code Attack
The CIH Virus, also known as the Chernobyl Virus, was directed towards Microsoft Windows
platforms. It became known as the Chernobyl Virus because the triggered payload date was
April 26th, t
Unit 1 Assignment 2 - Impact of a Data Classification Standard
The local area network domain or LAN is a group of computers all connected to one single LAN domain.
The LAN domain is a collection of computers connected to one another or to a common medium.
Unit 2 Assignment 1 - Calculate the Window of Vulnerability
Discovery Time, Exploit Time, Disclosure Time, and Patch Time are four things that must be
looked at and evaluated. Discovery Time, is the earliest date that a vulnerability is discovered and
Unit 2 Assignment 2 - Microsoft Environment Analysis
1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.
Microsoft Security Advisories 2755801-Update for Vulnerabilities in Adobe Flash Player in
Policies are a set of requirements or rules which are required to set a path to a specific objective.
Security policies should balance access and security. Security policies should minimize risk
while not imposing undue access restrictions on