Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

A. Answer to the following questions [in one or a few sentences (more than 4 sen

ID: 3756652 • Letter: A

Question

A. Answer to the following questions [in one or a few sentences (more than 4 sentences will be useless)]. 1. What is CIAA? 2. Name the services that are used to detect masquerade attack. 3. Describe all those circumstances in which you may realize that threats become attacks. 4. Write down 4 methods of cyber defense. 5. What are the differences between the system security and system correctness? B. Select/provide the correct term for the following statements. 6. "The property that a cyber system has when it executes its intended tasks perfectly, free from 7. 8. The main feature of an effective security system is the capability of ensuring that there is no 9. Providing data origin authentication service is to deal with the masquerade attack. 10. There is a type of attacks called unauthorized (whether intentional or accidental) manipulation of the system." This statement corresponds to the system authenticity. (True/False) data. (Passive/Active) hacker activity. (True/False) (True/False) which was previously sent by some other user, in the hope of replicating the message or attacks, which are not easy to detect as they involve no alternation of transmitted where the attacker directly transmits a message delaying the message arrival.

Explanation / Answer

Please Note: I have answered the first question and 5 sub-parts here, according to the Chegg Answering Guidelines. For receiving the answers to the rest of the Questions, please Re-post for the other Questions.

Answers)

A)

1. What is CIAA?

CIAA is Confidentiality, Integrity, Availability, and Authenticity - which means for guiding policies for information security within an organization.

2. Name the services that are used to detect a masquerade attack?

To detect a detect masquerade attack, the services are:

a) A Web stats software

b) Using 'netstat -an' in the command prompt

c) Check log files for abnormal activity

3. Describe the circumstances in which you may reliaze that threats become attcks.

A threat is a potential for a harmful event to occur which may lead to an attack. An attack is done against a target for doing harm. The circumstances in which you may realize that threats become attacks when the vulnerabilities regarding that threat are exploited and an attack is made on the same vulnerability of the threat.

4. Write down 4 methods of cyber defense.

The methods of cyber defense are:

Keep the OS and other software updated to the latest versions

Installation of firewall and other security software

Have data backed up and updated

Proper password management is mandatory

5. What are the differences between the system security and system correctness?

System security is the security of the system that is the protection and security of the system from threats and vulnerabilities or damage to their hardware, software or electronic data. System correctness is the reliability of the system and the adherence to the specifications, which determines how the software and the system should behave correctly under user circumstances and usage.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote