1) Describe two distinct types of attack against password systems and the countermeasures against each of those attacks.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter10: Planning For Contingencies
Section: Chapter Questions
Problem 1EDM
icon
Related questions
Question
1) Describe two distinct types of attack against password systems and the countermeasures against each
of those attacks.
2) Describe two general "good practices in coding". For each of them explain why they are appropriate
and give an example of what could go wrong if that practice is not followed.
3) A company has two departments, A and B, and has determined that it is appropriate to have two levels
of sensitivity, in increasing order: 0 and 1. Draw a BLP lattice system to represent this scenario. Using
examples referring to this lattice, explain the three BLP rules, 2 mandatory and 1 discretionary.
4) Explain what tailored attacks are. Give some specific examples in two different domains and explain
how they perform relative to other attacks in those domains.
Transcribed Image Text:1) Describe two distinct types of attack against password systems and the countermeasures against each of those attacks. 2) Describe two general "good practices in coding". For each of them explain why they are appropriate and give an example of what could go wrong if that practice is not followed. 3) A company has two departments, A and B, and has determined that it is appropriate to have two levels of sensitivity, in increasing order: 0 and 1. Draw a BLP lattice system to represent this scenario. Using examples referring to this lattice, explain the three BLP rules, 2 mandatory and 1 discretionary. 4) Explain what tailored attacks are. Give some specific examples in two different domains and explain how they perform relative to other attacks in those domains.
Expert Solution
steps

Step by step

Solved in 5 steps

Blurred answer
Knowledge Booster
Threats
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,