Computer Security and Cryptography, writing homework help
- Classify each of the following as a violation of confidentiality, of integrity, of availability, or of some combination thereof.
- Carry out your own research and answer the following questions.
- There are at least five basic types of firewalls and these can be classified by technology and by intended application. Below are some of these types of firewalls
- Describe the following methods of attack to a computer system
- Eve installs firesheep and hijacks Alice’s Facebook session. She reads Bob’s messages to Alice and sends a response.(2 marks)
- Julia hacks the website of www.visa.com and adds a message in support of wikileaks.(2 marks)
- Claire installs a sniffer and captures her office mate’s traffic. (2 marks)
- Alex posts a message on 4chan, a popular online forum, asking people to visit the slashdot.org website at 2 p.m. tomorrow. Nick pretends to be a system administrator and calls Ellen from human resources at his company, to ask for her password. He then logs in as Ellen and increases his salary by 20 percent.(2 marks)
- Ann mounts a man-in-the-middle attack by ARP spoofing and redirects all traffic at her student house through her own computer.(2 marks)
- Explain any four roles of a firewall in an organization’s private network.(4 marks)
- Describe any four types of firewalls.(8 marks)
- Exhaustive password(2 marks)
- Probable password(2 marks)
Coercion (2 marks)
Answer each question correctly and exhaustively.

