Not sure if my answers in bold are correct...examples of vulnerabilities are vag
ID: 671073 • Letter: N
Question
Not sure if my answers in bold are correct...examples of vulnerabilities are vague...not sure if my answers are right or how to justify them.can anyone help?
Classify each of the following as a violation of confidentiality, of integrity, of availability, of authenticity (i.e., non-repudiation of the origin), or of some combination of those. Then explain.
John deletes the homework assignment submitted by Mary. Availability
John copies Mary’s homework assignment without her knowledge, submits it as his own, and then deletes the original assignment Mary has submitted. Non-repudiation
A computer virus takes e-mail addresses from the user’s e-mail address book to spread itself by sending e-mail attachments. Confidentiality
Spyware that runs on Ann’s computer copies her keystrokes and sends them to its creator’s computer. Confidentiality
Carol changes one of her grades in the official school record from C to A. Integrity
Explanation / Answer
====================================================================
John deletes the homework assignment submitted by Mary.
----------
Answer:
----------
Availability
-------------
Explanation:
-------------
Availability is correct since your are deletling a message which is available
to Mary.
====================================================================
John copies Mary’s homework assignment without her knowledge, submits it as his own, and then deletes the original assignment Mary has submitted.
----------
Answer:
----------
Non-repudiation
-------------
Explanation:
-------------
The Origin of message must be verifiable by third party hence Non -Repudiation suits.
====================================================================
A computer virus takes e-mail addresses from the user’s e-mail address book to spread itself by sending e-mail attachments.
----------
Answer:
----------
Confidentiality
-------------
Explanation:
-------------
Un Authoirzed acceds leads to confidentiality.
====================================================================
Spyware that runs on Ann’s computer copies her keystrokes and sends them to its creator’s computer.
----------
Answer:
----------
Confidentiality
-------------
Explanation:
-------------
Un Authoirzed acceds leads to confidentiality.
====================================================================
Carol changes one of her grades in the official school record from C to A.
----------
Answer:
----------
Integrity
-------------
Explanation:
-------------
Since it is modification of data the integrity suits for this
constraint.
====================================================================
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.