Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Pease answer the following questions. Please give a brief explanation of each an

ID: 3785961 • Letter: P

Question

Pease answer the following questions. Please give a brief explanation of each answer. Please respond within 8 hours.

Verification that the credentials of a user or other system entity are valid is called Question options: adequacy. authentication. audit. In password cracking, the exponential wall means that Question options: the number of exponents that can be tested is limited mathematically, a string exponent is needed in the cryptographic key used to store passwords, the time for a brute force attach increases exponentially with the password length. An important principle of mandatory access control is Question options: access control is mandatory at all times, information flows up, not down, all information must be kept secure.

Explanation / Answer

6.

authorization : a act of confirming truth of a piece of data claimed true by an entity(person,organization,other system)

audit: act of examining system(software) records eg. database records, in order to check if they obey the security policies set by your organisation, To detect breaches and to recommend changes in policies.

Audit evaluates following:

Will the organization's computer systems be available for the business at all times when required? (known as availability) Will the information in the systems be disclosed only to authorized users? (known as security and confidentiality) Will the information provided by the system always be accurate, reliable, and timely? (measures the integrity) In this way, the audit hopes to assess the risk to the company's valuable asset (its information) and establish methods of minimizing those risks.

In short ,Audit checks the adequacy(effectiveness ) of system

adequacy : effectiveness of a system

Answer : authetication

--------------------------------------------------------------------------------------------------------------------------------------------------------------------

7.

Brue Force attack: Means trying all possible combinations to crack passwords.Although it is error free it is very time consuming.

As the length of passwords increase the combinations increase exponentially and so does the time to decode them which is also called as exponential wall

For eg.

Because guesses have a maximum length of six and are comprised of 95 characters—that's 26 lower-case letters, 26 upper-case letters, 10 digits, and 33 symbols—there are a manageable number of total guesses. This is calculated by adding the sum of 956 + 955+ 954 + 953+ 952 + 95=a

for max lennth of 7 ,total combinations= a+957

see the exponential rise in combinations as a result time to decode them also increses exponentially.

answer is :3

----------------------------------------------------------------------------------------------------------------------------------------------------------------

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote