Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Suppose you have a secure system with three subjects and three objects,with levels as listed below.

Here H dominates L. You wish to implement a Bell and LaPadula model of security for this system. Fill in the access rights (R and/or W) permitted by the model for each subject/object pair in the access matrix below:

(1) Subject: (H, {A}), Object: (L, {A,B})
- Can the subject read the object? Justify your answer

(2) Subject: (H, {A,B}), Object: (L, {A })

- Can the subject read the object? Justify your answer

(3) Subject: (L, {A,B}), Object: (H, {A })
- Can the subject read the object? Justify your answer

(4) Subject: (L, {A,B}), Object: (H, {A })
- Can the subject read the object? Justify your answer

(5) Subject: (H, {A,B,C}), Object: (H, {A,B })
- Can the subject read the object? Justify your answer

(6) Subject: (L, {A,B}), Object: (L, {C})
- Can the subject read the object? Justify your answer

2. Suppose a department has determined that some users have gained unauthorized access to the computing system. Managers fear the intruders might intercept or even modify sensitive data on the system. Cost to reconstruct correct data is expected to be $1,000,000 with 1% likelihood per year.

One approach to addressing this problem is to install a more secure data access control problem. The cost of access control software is $100,000 with 20% effectiveness.

(1) What is the expected annual total costs?

(2) What is the saving?

(3) Answer if it is worthwhile to invest on the access control software. Justify your answer.

3. Suppose the following:

- James' public key = Kj, James' private key = Kj-1
- Randy's public key = Kr, Randy's private key = Kr-1
- Each person's public key is known to others; Each one's private key is only known to the owner

a) Explain how Randy can send a plaintext P to James secretly

b) Explain how James can verify if a plaintext P is sent from Randy

c) Explain how Randy can verify if a plaintext P is sent from James and at the same time P is sent secretly from James to Randy.

4. IONA Corporation has the following class C Internet License: 193.1.1.0. IONA Corp. would like to allow for exactly 32 sub-networks using subnetting.

(193.45.1.0 -> 11110001.00000001.00000001.00000000)
a) How should Iona Corp. divide up the bits in their Class C license to allow for this?

b) How many devices on each subnet would this allow? Justify your answer

c) What would their subnet mask be? Justify your answer

d) What would be the IP address (Subnet ID) of the first useable subnet id?

e) What would be the IP address of the first useable host id on the first usable subnet id?

f) What would be the IP address of the last useable host id on the first useable subnet id?

g) What would be the broadcast address of the first useable subnet id?

5. Summarize one of the following topics within one page:

- Subnet and Subnet mask
- ARP Protocol
- TCP Protocol

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91708677

Have any Question?


Related Questions in Computer Engineering

Assume newspaper for garbage or recycling has a standard

Assume newspaper for garbage or recycling has a standard deviation of 2 pounds. If we want to estimate the average amount of newspaper for garbage or recycling within .25 pounds with 90% confidence, how many households m ...

Question suppose that we have a computer that can test 240

Question : Suppose that we have a computer that can test 2 40 keys each second. What is the expected time (in years) to find a key by exhaustive search if the keyspace is of size 288? What is the expected time (in years) ...

The demand for salt is relatively price inelastic while the

The demand for salt is relatively price inelastic, while the demand for pretzels is relatively price elastic. How can you best explain why and elaborate your answer.

Assignmentsuppose you are an isp that owns a 19 address

Assignment Suppose you are an ISP that owns a /19 address CIDR block starting at 118.235.160.0/19. Answer the following questions to allocate address blocks to 10 customers who want to pay for the smallest CIDR blocks to ...

Discuss the importance of using an access control model in

Discuss the importance of using an access control model in determining how employees in an organization should gain access to resources.

Regards to cin what programming situations would the use of

Regards to C++ In what programming situations would the use of an array be beneficial? What situations would not warrant the use of an array? Provide an example showing why. Research the concept of C++ vectors. Describe ...

We have a scheme program belowdefine lst i think you like

We have a Scheme program below: (define lst '(I (think you) like me)) (set! lst (cdr lst)) (set-car! lst '(thinks you)) (set! lst (cons 'he (cons 'also lst))) (a) For each execution step of the above program, draw the me ...

Birth weights of full-term babies in a certain area are

Birth weights of full-term babies in a certain area are normally distributed with mean 7.13 pounds and standard deviation 1.29 pounds. A newborn weighing 5.5 pounds or less is a low-weight baby. What is the probability t ...

Question provide a real-world example or describe a

Question: Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service. Need 300-350 words APA sta ...

Question suppose you arc a board game maker and you want to

Question : Suppose you arc a board game maker, and you want to give players a higher probability of rolling larger numbers. Originally you had them roll three six-sided dice and add their results. The new approach will h ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As