Describe two distinct types of attack against password systems and the countermeasures against each of those attacks.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter10: Planning For Contingencies
Section: Chapter Questions
Problem 1EDM
icon
Related questions
Question
1) Describe two distinct types of attack against password systems and the countermeasures against each
of those attacks.
2) Describe two general "good practices in coding". For each of them explain why they are appropriate
and give an example of what could go wrong if that practice is not followed.
3) A company has two departments, A and B, and has determined that it is appropriate to have two levels
of sensitivity, in increasing order: 0 and 1. Draw a BLP lattice system to represent this scenario. Using
examples referring to this lattice, explain the three BLP rules, 2 mandatory and 1 discretionary.
4) Explain what tailored attacks are. Give some specific examples in two different domains and explain
how they perform relative to other attacks in those domains.
5) Explain two outcomes an attacker may aim for with a Buffer overflow attack. Sketch how and why a
Buffer overflow attack works. You do not need to write code but can if it helps you to explain.
6) Explain what a Trojan Horse is. Describe two distinct methods of identifying a Trojan Horse and explain
when and why each of those methods might be appropriate.
Transcribed Image Text:1) Describe two distinct types of attack against password systems and the countermeasures against each of those attacks. 2) Describe two general "good practices in coding". For each of them explain why they are appropriate and give an example of what could go wrong if that practice is not followed. 3) A company has two departments, A and B, and has determined that it is appropriate to have two levels of sensitivity, in increasing order: 0 and 1. Draw a BLP lattice system to represent this scenario. Using examples referring to this lattice, explain the three BLP rules, 2 mandatory and 1 discretionary. 4) Explain what tailored attacks are. Give some specific examples in two different domains and explain how they perform relative to other attacks in those domains. 5) Explain two outcomes an attacker may aim for with a Buffer overflow attack. Sketch how and why a Buffer overflow attack works. You do not need to write code but can if it helps you to explain. 6) Explain what a Trojan Horse is. Describe two distinct methods of identifying a Trojan Horse and explain when and why each of those methods might be appropriate.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Risks related to security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,