Assignment 1 Sample Solutions
.pdf
keyboard_arrow_up
School
University of Regina *
*We aren’t endorsed by this school
Course
890
Subject
Computer Science
Date
Jan 9, 2024
Type
Pages
4
Uploaded by CountLeopardPerson1481
Assignment One (CS 890DJ, Fall 2023)
Note:
Question 1 to Question 9 are weighted 10 marks for each question, Question 10 is weighted 30 marks.
This makes the total of the assignment 1 to be 120 marks. However, this course
plans to use a sample-based
approach to the marking of the assignments. You will be expected to complete the assignments fully.
However, the course instructor will select a subset of items to be marked (a sample of your work). The
Teaching Assistants will be instructed to only mark these items, which will result in your grade on the
assignment.
1.
Slide Part 1, Page 5 listed 10 cybersecurity challenges which we also discussed in detail in class.
Please use your own words to explain all 10 challenges listed there in detail, one by one.
1)
Security is not as simple as it might first appear to the beginner. The requirements seem to be
straightforward; indeed, most of the major requirements for security services can be given self-
explanatory, one-word labels: availability, confidentiality, authentication, nonrepudiation, or integrity. But
the mechanisms used to meet those requirements can be quite complex and understanding them may
involve rather subtle reasoning.
2)
In developing a particular security mechanism or algorithm, one must always consider potential attacks on
those security features. In many cases, successful attacks are designed by looking at the problem in a
completely different way, therefore exploiting an unexpected weakness in the mechanism.
3)
Because of point 2, the procedures used to provide particular services are often counterintuitive. Typically,
a security mechanism is complex, and it is not obvious from the statement of a particular requirement that
such elaborate measures are needed. It is only when the various aspects of the threat are considered that
elaborate security mechanisms make sense.
4)
Having designed various security mechanisms, it is necessary to decide where to use them. This is true
both in terms of physical placement (e.g., at what points in a network are certain security mechanisms
needed) and in a logical sense (e.g., at what layer or layers of an architecture such as TCP/IP
[Transmission Control Protocol/Internet Protocol] should mechanisms be placed).
5)
Security mechanisms typically involve more than a particular algorithm or protocol. They also require that
participants be in possession of some secret information (e.g., an encryption key), which raises questions
about the creation, distribution, and protection of that secret information. There also may be a reliance on
communications protocols whose behavior may complicate the task of developing the security mechanism.
For example, if the proper functioning of the security mechanism requires setting time limits on the transit
time of a message from sender to receiver, then any protocol or network that introduces variable,
unpredictable delays may render such time limits meaningless.
6)
Computer and network security is essentially a battle of wits between a perpetrator who tries to find holes
and the designer or administrator who tries to close them. The great advantage that the attacker has is that
he or she need only find a single weakness, while the designer must find and eliminate all weaknesses to
achieve perfect security.
7)
There is a natural tendency on the part of users and system managers to perceive little benefit from
security investment until a security failure occurs.
8)
Security requires regular, even constant, monitoring, and this is difficult in today’s short-term, overloaded
environment.
9)
Security is still too often an afterthought to be incorporated into a system after the design is complete
rather than being an integral part of the design process.
10)
Many users and even security administrators view strong security as an impediment to efficient and user-
friendly operation of an information system or use of information.
2.
Confidentiality, Integrity, and Availability are known as the CIA triad. Please use your own words
to explain them in detail, one by one. Please also include authentication, non-repudiation, privacy in
your explanation.
Confidentiality, Integrity, and Availability, also known as the CIA triad, are the terms most commonly used to
define security, also called security objectives. They are the three key objectives that are at the heart of
information and network security.
•
Confidentiality: Confidentiality relates to permitting authorized access to information, while at the same
time protecting information from improper disclosure.
•
Integrity: Integrity is the property of information whereby it is recorded, used and maintained in a way that
ensures its completeness, accuracy, internal consistency and usefulness for a stated purpose.
•
Availability: Availability means that systems and data are accessible at the time that users need them.
(the above are very high level answers. More details please find from the slide part 1, page 7 - 19).
3.
The below trust model has been briefly explained in the class. Please use your words to describe it in
detail.
Typically, a trustor uses a number of factors to establish the trustworthiness of an entity. Three general factors
are commonly cited:
Ability: Also referred to as
competence
, this relates to the potential ability of the evaluated entity to do a given
task or be entrusted with given information.
Benevolence: This implies a disposition of goodwill towards the trusting party. That is, a trustworthy party does
not intend to cause harm to the trusting party. Benevolence is the opposite of malevolence.
Integrity: This can be defined as the trustor’s perception that the trustee adheres to a set of principles that the
trustor finds acceptable.
Integrity implies that a benevolent party takes such measures are necessary to assure that it in fact does not cause
harm to the trusting party.
The goal of trust, in the model of this Figure, is to determine what course of action, if any, the trusting party is
willing to take in relation to the trusted party. Based on the level of trust, and the perceived risk, the trusting
party may decide to take some action the involves some degree of risk taking. The outcome of the risk taking
could be a reliance on the trusted party to perform some action or the disclosure of information to the trusted
party with the expectation that the information will be protected as agreed between the parties.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
SQL Help
arrow_forward
A college course may have one or more scheduled sections or may not have a scheduled section. Attributes of COURSE include Course ID, Course Name, and Units. Attributes of SECTION include Section Number and Semester ID. Semester ID is composed of two parts: Semester and Year. Section Number is an integer (such as 1 or 2) that distinguishes one section from another for the same course but does not uniquely identify a section. How did you model SECTION? Why did you choose this way versus alternative ways to model SECTION?
arrow_forward
C sharp
Table: Student (the headers are the field names in the Students table)
StudentID
Name
Age
Gender
ProgramID
791
Stephanie Brown
19
Female
BCS
236
Shannon Dawn
25
Female
BA
618
Geoff Berg
24
Male
ARET
256
Andrew Schilling
22
Male
BSC
902
Gary Sang
23
Male
DAAD
Note: There is a StudentDataSet with a Student table, a StudentTableAdapter, a StudentBindingSource, and a StudentDataGridView control on the form.Note: There is an Average query, named Average, that returns the average age of the student from the Student table.Note: There is also Max query, named Highest, that returns the highest age of the student from the Student table.Write the code you would place in the AverageButton click event on your form to call the Average query and the Highest query and display in a DifferenceLabel, the difference between the highest age of a student and the average age.
arrow_forward
Annotated Bibliography
As a graduate student, one of the fundamental techniques to gather research for a paper is the use of an Annotated Bibliography. Furthermore, as a human-computer interaction researcher, finding relevant literature to support a study is also part of preparing an analytical research paper. For this assignment, you’ve been assigned a topic (see below). You’ve also been assigned to a specific group (see Groups in Blackboard). Each member of the group is to find five UNIQUE references. These references are to be scholarly papers, not wiki, blog, or Website entries. Do not include textbooks or trade publications either. The use of Google Scholar is STRONGLY recommended. IMPORTANT: To support your research journey, read the Levy & Ellis (2006) article on how to maximize your research opportunities in Information Systems Research.
(5 to 6) entries.
Your assigned topic is as follows:
Context-Aware Computing
arrow_forward
database
arrow_forward
The data model excludes an item for what reason?
arrow_forward
Software engineering
arrow_forward
Note: “breadth” is a boolean indicating whether or not a course satisfies the breadth requirement for degrees in the Faculty of Arts and Science.
Student(sID, surName, firstName, campus, email, cgpa)
Course(dept, cNum, name, breadth)
Offering(oID, dept, cNum, term, instructor)
Took(sID, oID, grade)
answer queries for them
Department and cNum of all courses that have been taught in every term when csc448 was taught?
Name of all students who have taken, at some point, every course Gries has taught (but not necessarily taken them from Gries).?
Department and course number of courses that have never been offered?
arrow_forward
Want in detail
arrow_forward
Task 12: List the item ID, description, and category for each pair of items that are in the same category. (For example, one such pair would be item FS42 and item PF19, because the category for both items is FSH.) Order the output by category.
arrow_forward
SQL query Knowledge
arrow_forward
SQL knowledge question
arrow_forward
QUESTION 1
An admission charge for Bandar Orchid Wetlands varies according to the age of the customer
as in Figure 1. The system will receive the input for the number of persons for each category
as in Figure 2. Then, it will calculate and display the total charge (include SST 8%) and the
category Figure 3. [Assume all items are required. The process is not involving any decision].
Category (Age)
50 and above
13- 49
7-12
4-0
Charge (RM)
30.00
35.00
25.00
15.00
Below 4
Figure 1: Charges for Visitors
Free
The Bold items are the input from the user.
WELCOME TO BANDAR ORCHID WETLANDS
Enter the number of persons for each category
Age Over 50
Age 13 - 50
Age 7 - 12
Age 4 - 6
Age Below 4
1
2
Figure 2: The Input
Total for Over 50 (1 Fersons): BM 30.00
Total for 13 - 50 (2 Persons): RM 70.00
Total for 7 - 12 (4 Persons): RM 100.00
Total for 4 - 6_(O Persons): RM
0.00
Total for Below 4 (FREE)
: RM
0.00
ITEMS
RM
200.00
12.00
TOTAL
3ST (6R)
SUB-TOTAL =
212.00
THANK YOU.ENJOY YOUR HOLIDAY!!
Figure…
arrow_forward
When building a data model, why is it sometimes preferable to not include a certain piece of information?
arrow_forward
sql queries
Employees(EMPLOYEE_ID, FIRST_NAME, LAST_NAME, EMAIL, PHONE_NUMBER, HIRE_DATE,JOB_ID, SALARY, COMMISSION_PCT, MANAGER_ID, DEPARTMENT_ID,DEPARTMENT_NAME)Department(DEPARTMENT_ID, DEPARTMENT_NAME, MANAGER_ID, LOCATION_ID)Location(LOCATION_ID,STREET_ADDRESS,POSTAL_CODE,CITY,STATE_PROVINCE,COUNTRY_ID)
Write a query in SQL to display the Entire data of All those employees whoseDEPARTMENT_ID is greater than the DEPARTMENT_ID of all those employees who earn morethan 50,000 per month
Write a query in SQL to display the minimum, maximum salary and DEPARTMENT_NAMEof all those departments whose minimum salary is greater than 4000 in ascending order.
arrow_forward
SQL QUERIES
Employees(EMPLOYEE_ID, FIRST_NAME, LAST_NAME, EMAIL, PHONE_NUMBER, HIRE_DATE,JOB_ID, SALARY, COMMISSION_PCT, MANAGER_ID, DEPARTMENT_ID,DEPARTMENT_NAME)Department(DEPARTMENT_ID, DEPARTMENT_NAME, MANAGER_ID, LOCATION_ID)Location(LOCATION_ID,STREET_ADDRESS,POSTAL_CODE,CITY,STATE_PROVINCE,COUNTRY_ID)
Write a Query in SQL to delete the record of all those cities where city name ends with b fromlocations table.
arrow_forward
SQL QUERIES
Employees(EMPLOYEE_ID, FIRST_NAME, LAST_NAME, EMAIL, PHONE_NUMBER, HIRE_DATE,JOB_ID, SALARY, COMMISSION_PCT, MANAGER_ID, DEPARTMENT_ID,DEPARTMENT_NAME)Department(DEPARTMENT_ID, DEPARTMENT_NAME, MANAGER_ID, LOCATION_ID)Location(LOCATION_ID,STREET_ADDRESS,POSTAL_CODE,CITY,STATE_PROVINCE,COUNTRY_ID)
Write a query in SQL to display the DEPARTMENT_NAME of all those Departments whoseDEPARTMENT_ID is greater than the DEPARTMENT_ID of Physics department.
Write a Query in SQL to show the FIRST_NAME of all those employees whose salary is lessthan the salary of all those employees whose MANAGER_ID is 101 or 102.
arrow_forward
For the term project, you should write a report on a chosen topic related to your field. Follow the steps below:
Choose a topic : Technology
Narrow it down : Algorithms and data structures
Find at least 10 related articles to your topic
Read the articles, synthesize them and report the parts you want.
Use appropriate citations and quotations (APA 6th or 7th edition)
You need a reference list at the end of your report.
The report should be minimum 1000 and maximum 2000 words.
arrow_forward
How many committees can be formed from a group of 9 persons by taking any member at any time?
arrow_forward
Briefly explain table-driven selection
arrow_forward
Data Manipulation Discussion
What is the syntax of composite conditions - that is, selection or merging on two or more columns?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Related Questions
- SQL Helparrow_forwardA college course may have one or more scheduled sections or may not have a scheduled section. Attributes of COURSE include Course ID, Course Name, and Units. Attributes of SECTION include Section Number and Semester ID. Semester ID is composed of two parts: Semester and Year. Section Number is an integer (such as 1 or 2) that distinguishes one section from another for the same course but does not uniquely identify a section. How did you model SECTION? Why did you choose this way versus alternative ways to model SECTION?arrow_forwardC sharp Table: Student (the headers are the field names in the Students table) StudentID Name Age Gender ProgramID 791 Stephanie Brown 19 Female BCS 236 Shannon Dawn 25 Female BA 618 Geoff Berg 24 Male ARET 256 Andrew Schilling 22 Male BSC 902 Gary Sang 23 Male DAAD Note: There is a StudentDataSet with a Student table, a StudentTableAdapter, a StudentBindingSource, and a StudentDataGridView control on the form.Note: There is an Average query, named Average, that returns the average age of the student from the Student table.Note: There is also Max query, named Highest, that returns the highest age of the student from the Student table.Write the code you would place in the AverageButton click event on your form to call the Average query and the Highest query and display in a DifferenceLabel, the difference between the highest age of a student and the average age.arrow_forward
- Annotated Bibliography As a graduate student, one of the fundamental techniques to gather research for a paper is the use of an Annotated Bibliography. Furthermore, as a human-computer interaction researcher, finding relevant literature to support a study is also part of preparing an analytical research paper. For this assignment, you’ve been assigned a topic (see below). You’ve also been assigned to a specific group (see Groups in Blackboard). Each member of the group is to find five UNIQUE references. These references are to be scholarly papers, not wiki, blog, or Website entries. Do not include textbooks or trade publications either. The use of Google Scholar is STRONGLY recommended. IMPORTANT: To support your research journey, read the Levy & Ellis (2006) article on how to maximize your research opportunities in Information Systems Research. (5 to 6) entries. Your assigned topic is as follows: Context-Aware Computingarrow_forwarddatabasearrow_forwardThe data model excludes an item for what reason?arrow_forward
- Software engineeringarrow_forwardNote: “breadth” is a boolean indicating whether or not a course satisfies the breadth requirement for degrees in the Faculty of Arts and Science. Student(sID, surName, firstName, campus, email, cgpa) Course(dept, cNum, name, breadth) Offering(oID, dept, cNum, term, instructor) Took(sID, oID, grade) answer queries for them Department and cNum of all courses that have been taught in every term when csc448 was taught? Name of all students who have taken, at some point, every course Gries has taught (but not necessarily taken them from Gries).? Department and course number of courses that have never been offered?arrow_forwardWant in detailarrow_forward
- Task 12: List the item ID, description, and category for each pair of items that are in the same category. (For example, one such pair would be item FS42 and item PF19, because the category for both items is FSH.) Order the output by category.arrow_forwardSQL query Knowledgearrow_forwardSQL knowledge questionarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LProgramming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:Cengage
- A Guide to SQLComputer ScienceISBN:9781111527273Author:Philip J. PrattPublisher:Course Technology PtrProgramming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning