Describe two distinct types of attack against password systems and the countermeasures against each of those attacks.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question
1) Describe two distinct types of attack against password systems and the countermeasures against each
of those attacks.
2) Describe two general "good practices in coding". For each of them explain why they are appropriate
and give an example of what could go wrong if that practice is not followed.
3) A company has two departments, A and B, and has determined that it is appropriate to have two levels
of sensitivity, in increasing order: 0 and 1. Draw a BLP lattice system to represent this scenario. Using
examples referring to this lattice, explain the three BLP rules, 2 mandatory and 1 discretionary.
4) Explain what tailored attacks are. Give some specific examples in two different domains and explain
how they perform relative to other attacks in those domains.
5) Explain two outcomes an attacker may aim for with a Buffer overflow attack. Sketch how and why a
Buffer overflow attack works. You do not need to write code but can if it helps you to explain.
6) Explain what a Trojan Horse is. Describe two distinct methods of identifying a Trojan Horse and explain
when and why each of those methods might be appropriate.
Transcribed Image Text:1) Describe two distinct types of attack against password systems and the countermeasures against each of those attacks. 2) Describe two general "good practices in coding". For each of them explain why they are appropriate and give an example of what could go wrong if that practice is not followed. 3) A company has two departments, A and B, and has determined that it is appropriate to have two levels of sensitivity, in increasing order: 0 and 1. Draw a BLP lattice system to represent this scenario. Using examples referring to this lattice, explain the three BLP rules, 2 mandatory and 1 discretionary. 4) Explain what tailored attacks are. Give some specific examples in two different domains and explain how they perform relative to other attacks in those domains. 5) Explain two outcomes an attacker may aim for with a Buffer overflow attack. Sketch how and why a Buffer overflow attack works. You do not need to write code but can if it helps you to explain. 6) Explain what a Trojan Horse is. Describe two distinct methods of identifying a Trojan Horse and explain when and why each of those methods might be appropriate.
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Risks related to security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education