Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Not sure if my answers in bold are correct...examples of vulnerabilities are vag

ID: 671073 • Letter: N

Question

Not sure if my answers in bold are correct...examples of vulnerabilities are vague...not sure if my answers are right or how to justify them.can anyone help?

Classify each of the following as a violation of confidentiality, of integrity, of availability, of authenticity (i.e., non-repudiation of the origin), or of some combination of those. Then explain.

John deletes the homework assignment submitted by Mary. Availability

John copies Mary’s homework assignment without her knowledge, submits it as his own, and then deletes the original assignment Mary has submitted. Non-repudiation

A computer virus takes e-mail addresses from the user’s e-mail address book to spread itself by sending e-mail attachments. Confidentiality

Spyware that runs on Ann’s computer copies her keystrokes and sends them to its creator’s computer. Confidentiality

Carol changes one of her grades in the official school record from C to A. Integrity

Explanation / Answer

====================================================================
John deletes the homework assignment submitted by Mary.

----------
Answer:
----------

   Availability

-------------
Explanation:
-------------

   Availability is correct since your are deletling a message which is available
to Mary.

====================================================================
John copies Mary’s homework assignment without her knowledge, submits it as his own, and then deletes the original assignment Mary has submitted.

----------
Answer:
----------

   Non-repudiation

-------------
Explanation:
-------------

   The Origin of message must be verifiable by third party hence Non -Repudiation suits.

====================================================================
A computer virus takes e-mail addresses from the user’s e-mail address book to spread itself by sending e-mail attachments.

----------
Answer:
----------

   Confidentiality

-------------
Explanation:
-------------

   Un Authoirzed acceds leads to confidentiality.

====================================================================
Spyware that runs on Ann’s computer copies her keystrokes and sends them to its creator’s computer.

----------
Answer:
----------

   Confidentiality

-------------
Explanation:
-------------

   Un Authoirzed acceds leads to confidentiality.

====================================================================
Carol changes one of her grades in the official school record from C to A.

----------
Answer:
----------

   Integrity

-------------
Explanation:
-------------

   Since it is modification of data the integrity suits for this
constraint.
====================================================================

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote