Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Q 1 . What are the three types of user authentication? What is challenge - response authentication and how does it work? Q 2 .
Q What are the three types of user authentication? What is challengeresponse authentication and how does it work?
Q What is copyonwrite and how does it work?
Q What is rolebased access control? How does it differ from mandatory access control?
Q Describe an access matrix. What is a protection domain? What does the superscript c mean in an access matrix? What does the o mean? What is an access list? What is a capability list?
Q Name and describe the three main goals of cryptography. What is secret key, or symmetric, cryptography? How does it differ from publickey or asymmetric cryptography?
Q If Bob and Alice are using public key cryptography, and Bob wants to send Alice a secret encrypted message, which key would he use his public, his private, Alices public, or Alices private If he wants Alice to be able to verify that he is the one that sent the message, which of the four keys would he use? What is a digital signature and how is it created?
Q What is the difference between a threat, a vulnerability, and an attack? Name and describe five cybersecurity vulnerabilities. Name and describe five cybersecurity attacks.
Q Name and describe the four levels of security measures. What is an attack surface? What is social engineering? What is phishing?
Q What is the difference between a mechanism and a policy? Give examples of each.
Q Describe the principle of least privilege. What is compartmentalization? Describe defense in depth. What is a protection domain?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started