mccaffery_a20

docx

School

University of Rhode Island *

*We aren’t endorsed by this school

Course

434

Subject

Computer Science

Date

Apr 3, 2024

Type

docx

Pages

2

Uploaded by EarlBraveryPheasant31

Report
Nicholas McCaffery CSF 434/534 - Assignment #20 Spring 2020 Question 1: ----------- Access control is commonly confused with authentication because it sometimes refers to all security features used to prevent unauthorized access to a computer system or network. Question 2: ----------- Question 3: ----------- The owner of an object chooses who has access to what file in a DAC Question 4: ----------- Boolean logic is used a lot in ABAC because many times attributes need only two comparisons to tell if they are needed or not. Question 5: ----------- Rule-based access control can work in tandem with the other forms of access control for implementation purposes. Question 6: ----------- Some tools used to manage physical access control are proximity cards, fingerprint scanners, voice recognition, and smart cards. Question 7: ----------- Software is used in physical access control by not requiring the user to have a separate physical device on hand. Question 8: ----------- A system with false negatives would be better since it would only be someone who works there being denied and not in the case where a possible outsider could gain access to the office. Question 9: ----------- The biometric factor that has a high chance of false positives is iris scanners and the one that has a higher chance of false negatives is face-based recognition. Question 10: ----------- Apple’s touch ID is a form of linking a passcode to a fingerprint to allow easy unlock or a more secure way to unlock your phone. The issue with this is that sometimes if your hand is wet or is not placed correctly it may not recognize the fingerprint you scanned correctly. Apple’s Face ID is a form of unlocking your phone with your face. There were some issues surrounding this
with security however. Some were concerned if it would unlock with any picture of you. Question 11: ----------- A physical access control method that uses tokens is a keyfob with an RFID chip. Question 12: ----------- Tokens are commonly used in two factor authentication for storing a key in a secured location on a person’s computer. Question 13: ----------- Tokens represent something you have with respect to authentication as well as a device that can store more information than a user can memorize. Question 14: ----------- Hardware tokens are physical tokens that are carried on person while software tokens are tokens that are planted into a users computer. Hardware tokens usually change their value from 30 to 90 seconds. Software tokens are usually set numbers that will not change as they usually have encryption algorithms attached to them so no one can gain access to the special token number besides the user. Question 15: ----------- FAT32 can not be used in file system security instances because it does not support user-level access differentiation. Question 16: ----------- Database security is needed because the data within them represents valuable information assets.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help