Consider an automated teller machine (ATM) in which users provide a personal identification… 1 answer below »

1. What is the difference between passive and active security threats?

2. Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system.

3. Consider a desktop publishing system used to produce documents for various organizations.

a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.

b. Give an example of a type of publication in which data integrity is the most important requirement.

c. Give an example in which system availability is the most important requirement.

4. Draw a matrix similar to the image that shows the relationship between the listed security service and the listed attacks:

– Security Services: Peer entity authentication, Confidentiality, Traffic flow confidentiality, Data Integrity, Availability.

– Attacks: Release of message contents, Traffic analysis, Masquerade, Replay, Modification of messages, Denial of service.

Attachments:

You don't know how to answer this question. We can help you find the right answer.

We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount! Use Discount Code "save15" for a 15% Discount!

Get Started

No need to wonder who can do my homework. You can always reach our team of professionals to do your homework at a low price.