1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anton [14]
3 years ago
15

Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or

some combination thereof: a) A hacker obtains millions of Yahoo passwords. b) Anthony accidentally cuts the electricity from the server room. c) The NSA finds an efficient method to break AES. d) Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name. e) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt it. f) The NSA wiretaps the cell phone of a suspect in a criminal investigation. g) A foreign state actor finds a zero-day vulnerability for voting machines used in the US.
Computers and Technology
1 answer:
AlexFokin [52]3 years ago
4 0

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

You might be interested in
Prepare a algorithm visualization for the Tower of Hanoi when 4 disks are to be moved from spindle #1 to spindle #3.
Setler [38]

Answer:

follwing is the code for Tower of Hanoi for n disks.

#include <iostream>

using namespace std;

void towofhan(int n,char source,char aux,char dest)//function for tower of hanoi..

{

if(n<0)

return ;

   if(n==1)//base case.

   {

       cout<<"Move disk 1 from "<<source<<" to spindle "<<dest<<endl;

       return;

   }

   towofhan(n-1,source,dest,aux);//recursive call.

   cout<<"move disk "<<n<<" from "<<source<<" to spindle "<<dest<<endl;

   towofhan(n-1,aux,source,dest);//recursive call.

}

int main() {

   int n=4;

   towofhan(n,'1','2','3');//function call.

   return 0;

}

Explanation:

If there is only 1 disk then we have to move the disk from source to destination.

Then after that we will apply recursion to solve the problem.

We have to work on only nth disk else will be done by the recursion.

First call recursion to move n-1 disks from source to auxiliary.

Then move nth disk from source to destination spindle.

Now move n-1 disks that are on the auxiliary spindle to destination spindle.

6 0
3 years ago
Which activity can be used to modify the value of an existing cell in a datatable
stepladder [879]

Answer:

The name of the activity is "Add Data Column".

Explanation:

Add data column activity is a part of the database that is used in used for adding a column in the database table. This activity also used in Windows.  

  • It provides attachment in windows activity by using Uipath studio.
  • The Uipath studio is used to connect with any application, that enables by windows, and to perform multiple operations on single user interface elements.
4 0
3 years ago
What is the main purpose of a DNS server?
Daniel [21]

Answer:

C

Explanation:

Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

3 0
3 years ago
Assume that the "read/write file to hard disk" library is part of the kernel. Assume that this library uses 1MB of RAM. Assume t
scZoUnD [109]

Answer:

The Answer is 1 MB.

Explanation:

In order to replace the library it must write 0 MB to hard drive then only it can be replaced. Therefore 1 MB is the correct answer.

5 0
4 years ago
Recursion does NOT take place if any of the following happen:
Kruka [31]

Recursion does NOT take place if any of method A calls method B, which calls method A

II. method A calls method B, which calls method A

<u>Explanation:</u>

Recursion is function is function which is used to call a same function by itself by multiple times with certain condition or loops.

These type of function extremely used on data structure or virus (TSR). Purpose of the function is repeated process and checks the validation and exit by true or false.

In programming languages such as c or c++, vb.net, c# is used to menu organizations so the same function is called and used so the end user don’t write separate function for each times. In case end user has not doesn’t proper exit method on recursion function system either hang or real task to exits.

3 0
3 years ago
Other questions:
  • Two electronics technicians are looking at the piece of testing equipment shown in the figure above. Technician A says that this
    10·1 answer
  • When using IPsec, how can you ensure that each computer uses its own private key pair?
    12·1 answer
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • Which virus-infecting components are email messages prone to carry?
    8·2 answers
  • What are the step by step instructions on how to rename a document(without opening it) that is filed in my computer/my documents
    9·1 answer
  • A simulation model includes: a. a description of the components of the system. b. a simulation clock. c. a definition of the sta
    8·1 answer
  • Find and fix the error in the if-else statement. import java.util.Scanner;
    11·2 answers
  • DJ Davon is making a playlist for an internet radio show; he is trying to decide what 1212 songs to play and in what order they
    12·1 answer
  • What episode and Season of Simpsons is this
    10·1 answer
  • Convert one billion byte into one storage unit​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!