The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 3 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
can someone please help me with this homework I really need the help completing this assignment
Â
1CS 678 – Data Security Fall 2016Instructor: Prof. P. T. ChungHomework 1 (100 Points) (Due 10/1).For homework assignment, individual work is encouraged; Small group work is permitted, youmay work with group and have a group formed by 2~3 team members; For any case, noplagiarism is allowed and Technical Writing with citationsshould be followed for preparingessay style questions.Please submit your work to pingtsaichung@gmail.com( i.e., ptchung@ieee.org) on9/30andhand in one hard copy in class on 10/1.For group work,please list names of your co-workers in your homework cover sheet, only one submission isnecessary.Note that please show intermediate steps to get your final answers, if applied.Thank you.I. ReadingAssignments:1.Read– Textbook Chapter 1 - Introduction, andChapter 8 – Cryptography2. Read Notes on Introduction and Notes on Conventional Encryption.II. Homework Assignments:Problem 1: (Computer Security) Each user on a computer system has a password, which issix to eight characters long, where each character is an uppercase letter or a digit. Eachpassword must contain at least one digit. How many possible passwords are there(10 Points)?Problem 2: (Confidentiality and Data Integrity) Do the problems R-1.4 and R-1.5.(20 Points)Problem R-1.4.What are some of the techniques that are used to achieve confidentiality?Problem R-1.5.What is the most efficient technique for achieving data integrity?Problem 3: (The C.I.A. and A.A.A. Concepts) Do the problems R-1.9 and R-1.10.(20 Points)Problem R-1.9.With respect to the C.I.A. and A.A.A. concepts, what risks are posted by packetsniffers, which monitor all the packets that are transmitted in Wireless Internet access point?Problem R-1.10.With respect to the C.I.A. and A.A.A. concepts, what risks are posted bysomeone burning songs from an online music store onto a CD, then ripping those songs into theirMP3 player software system and making dozens of copies of these songs for their friends?
Attachments:
-----------