Draw a matrix similar to the table presented in class that


Question 1:

Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system. In each case, indicate the degree of importance of the requirement.

Question 2

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Peer entity authentication" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 3

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Data origin authentication" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 4

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Access Control" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 5

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Confidentiality" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 6

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Traffic flow confidentiality" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 7

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Connection-Oriented Data Integrity" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 8

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Non-repudiation" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Question 9

In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:

Which attack(s) can be prevented by the "Availability" security service?

- Release of message contents

- Traffic analysis

- Masquerade

- Replay

- Modification of messages

- Denial of service

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Draw a matrix similar to the table presented in class that
Reference No:- TGS0904931

Now Priced at $35 (50% Discount)

Recommended (99%)

Rated (4.3/5)