合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

        代寫SEHS4515 Computer Security

        時(shí)間:2024-04-16  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)



        SEHS4515 Individual Assignment 2**4s2 Page 1
        SEHS4515 Computer Security
        Individual Assignment
        Due: 19 April 2024 (Friday) 6:00pm
        Objectives
        • To let students apply computer security concepts in real-life settings.
        • To show students’ understanding of the requirements and technologies in
        computer security.
        Instructions
        • This assignment should be completed individually and neatly.
        • Plagiarism will be penalized severely. Marks will be deducted for assignments
        that are plagiarized in whole or in part, regardless of the sources.
        • Late submission is subject to mark deduction penalty.
        • Answer ALL questions.
        • Please state clearly your source of reference.
        • You can attach your reference materials.
        Submission
        • Submit your work in softcopy before the due date.
        • Save your work, or scan your handwritten work, into a PDF file. Use the file
        name yourname_StudentID.pdf and submit it via Blackboard.
        Grading Aspects
        • Marks are given to the accuracy of both steps and answer. Detailed steps should
        be provided.
        • No mark would be given if your work is not readable (especially for handwritten
        work) and/or the steps cannot be followed.
        • Late submission will have mark deduction of 20% per day late, including Sunday
        and public holiday. Late more than 4 days will not be accepted.
        SEHS4515 Individual Assignment 2**4s2 Page 2
        Question 1 (25%)
        Read the following article about “Travel agencies’ customer databases being hacked”:
        https://www.pcpd.org.hk/english/enforcement/case_notes/casenotes_2.php?id=2018DB0
        2&content_type=&content_nature=&msg_id2=545
        (a) Analyze the possible threat(s), vulnerability(es) and risk(s) in the above case. (6%)
        (b) Compare the attack in the article with WannaCry attack. (6%)
        (c) What countermeasure(s) did the travel agency take? Briefly explain each of them.
        (7%)
        (d) Suppose the agency has approximately $413 million in annual revenue. There are two
        incidents of such attack per year and each attack causes 10% drop of the annual
        revenue. Perform a risk analysis and suggest an acceptable cost of mitigation service.
        (6%)
        Question 2 (25%)
        (a) Suppose you are designing the public and private keys for RSA public-key encryption.
        Given p=11 and q=23.
        (i) If the public key is e=13, what is private key d? (5%)
        (ii) A message m=7 is encrypted using the above RSA settings, what would be the
        cipher text c? (5%)
        (iii) A cipher text c=3 is decrypted using the above RSA settings, what would be the
        plain text m? (5%)
        (b) Calculate the multiplicative inverse of 31 mod 70 using the Extended Euclidean
        Algorithm. (5%)
        (c) Assume your HKID card number is made from the last six digits of your student ID
        number. For example, if student ID = 12345678S, then HKID = S345678(*).
        Calculate the check digital (*). (5%)
        SEHS4515 Individual Assignment 2**4s2 Page 3
        Question 3 (20%)
        Multi-factor authentication (MFA) is a method of computer access control in which a
        user is granted access only after successfully presenting several separate pieces of
        evidence an authentication mechanism.
        (a) What is the meaning of “separate pieces of evidence”? (5%)
        (b) Are username and password considered as two separate pieces of evidence? Justify
        your answer. (5%)
        (c) Perform a simple research from the Internet, what is the maximum number of factors
        used in MFA can you find? Briefly explain each factor. (10%)
        Question 4 (30%)
        There are 12 types of malware listed in this website:
        https://www.kaspersky.com/resource-center/threats/types-of-malware
        For each type of malware, find out the following information.
        (a) Their characteristics (12%)
        (b) The way they spread (6%)
        (c) The potential damages/negative effect they cause (12%)
        - End of Assignment -

        請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp

        掃一掃在手機(jī)打開當(dāng)前頁
      1. 上一篇:代寫COMP30023: Computer Systems
      2. 下一篇:菲律賓馬尼拉機(jī)場在哪
      3. 無相關(guān)信息
        合肥生活資訊

        合肥圖文信息
        急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
        急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
        出評(píng) 開團(tuán)工具
        出評(píng) 開團(tuán)工具
        挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
        挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
        海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
        海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
        合肥機(jī)場巴士4號(hào)線
        合肥機(jī)場巴士4號(hào)線
        合肥機(jī)場巴士3號(hào)線
        合肥機(jī)場巴士3號(hào)線
        合肥機(jī)場巴士2號(hào)線
        合肥機(jī)場巴士2號(hào)線
        合肥機(jī)場巴士1號(hào)線
        合肥機(jī)場巴士1號(hào)線
      4. 短信驗(yàn)證碼 酒店vi設(shè)計(jì) deepseek 幣安下載 AI生圖 AI寫作 aippt AI生成PPT 阿里商辦

        關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

        Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
        ICP備06013414號(hào)-3 公安備 42010502001045

        主站蜘蛛池模板: 中文字幕精品一区影音先锋 | 国产一区二区三区在线视頻| 无码人妻久久久一区二区三区| 一区二区日韩国产精品| 久久久久人妻一区精品果冻| 国产成人一区二区三区在线观看| 精品无码成人片一区二区98| 一本一道波多野结衣AV一区| 精品乱码一区二区三区四区| 美日韩一区二区三区| 成人精品一区二区三区不卡免费看| 无码人妻久久一区二区三区免费| 在线视频精品一区| 一区二区视频在线观看| 国产美女露脸口爆吞精一区二区| 无码精品尤物一区二区三区| 中文字幕一区二区三区永久 | 成人区人妻精品一区二区不卡网站| 麻豆高清免费国产一区| 中文人妻无码一区二区三区| 精品一区精品二区| 乱中年女人伦av一区二区| 国产精品无码一区二区三区不卡| 亚洲AV无码一区二区三区系列| 亚洲国产一区视频| 乱中年女人伦av一区二区| 亚洲福利视频一区二区| 视频在线观看一区| 三级韩国一区久久二区综合| 日韩精品一区二区三区影院| 国产精品美女一区二区 | 一区精品麻豆入口| 精品国产毛片一区二区无码| 午夜一区二区免费视频| 精品国产福利在线观看一区| 国产a久久精品一区二区三区| 女女同性一区二区三区四区| 八戒久久精品一区二区三区| 国产成人高清精品一区二区三区| 国产在线精品一区二区高清不卡 | 国产乱码精品一区二区三区麻豆|