CS 471 SEU Computer Security Countermeasures Questions

College of Computing and InformaticsAssignment 1
Deadline: Monday 2/10/2023 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name: ###
ID: ###
CRN: ###
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
CLO1
Define the
fundamental
concepts of
computer security
including design
principles,
cryptography, risk
assessment and
risk management.
Question One
3 Marks
Choose any electronic system and explain how the basic principles must be
applied to protect the system, what are the expected vulnerabilities and how to
countermeasure these vulnerabilities.
Question Two
Pg. 02
Learning
Outcome(s):
CLO3
Identify security
challenges and
apply various
security
management
tools to ensure
system security
and privacy.
Question Two
1.5 Marks
Illustrate the need for database security apart from ordinary measures taken
for computer security. Explain three crucial points and their impacts on the
system.
Question Three
Pg. 03
Learning
Outcome(s):
CLO4
Ability to employ
appropriate
cryptography
techniques to
protect system
and network data.
Question Three
1.5 Marks
Alice and Bob use the Diffie–Hellman key exchange technique with a common
prime.
q = 157 and a primitive root a = 6.
a. If Alice has a private key XA = 27, find her public key YA.
b. If Bob has a private key XB = 15, find his public key YB.
c. What is the shared secret key between Alice and Bob?
Question Four
Pg. 04
Learning
Outcome(s):
CLO3
Identify security
challenges and
apply various
security
management
tools to ensure
system security
and privacy.
Question Four
Explain the suitability or unsuitability of the following passwords:
1- AK 574
2- M&fmitm
3- abcdefghijk
4- starbucks1
5- Riyadh
6- superman
7- pc4stove
8- 12345678
2 Marks

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Order a unique copy of this paper

600 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
Top Academic Writers Ready to Help
with Your Research Proposal

Order your essay today and save 25% with the discount code GREEN