Concept explainers
Description: In this project, we develop a secure online application for storing a person's last wishes and
all the secret information an individual would like to share with his/her successors. This includes any
logins and passwords from any social media tools, online banking applications, computers, phones, etc.
If something happens, this information is typically extremely difficult to obtain. Many times, people pass
away without leaving any notes on their property and any relevant information that they wish their
successors know afterward
-How much will they be charged and how will it be paid: The service will charge an annual subscription
fee, which will vary depending on the types and the variety of the assets kept in the vault as well as the
volume of those assets (if media). The price of subscription will also range depending on the users’ age
and the level of access security and the types of the triggers used to release the information to potential
successors or other designated parties. The price may also range depending on the number of those
beneficiaries.
The most basic subscription fee for an electronic will and the access codes to banks and social media
and the information on the location of physical assets of interest would be around 24 dollars a year for
young users in the age of 20-30. Adding more services can raise this price up to 48 dollars a year for
the same age group. This is around 1,440 to 2,880 over a lifetime. Discounts will apply if a user pays for multi-year periods.
(-You basically need to make financial predictions on how much everything will cost and the layout)
Step by stepSolved in 3 steps
- Why is it preferable to hash passwords before putting them in a file rather than encrypting the password file itself when storing passwords?arrow_forwardWhich access control method limits a user's ability to get to the knowledge they need to do their job?arrow_forwardMatch the attack vector with the identified attack (see attched photo) You can only choose one attack for each and once used you cannot re-use the attack.arrow_forward
- Password managers may be either independent applications or browser add-ons. What should I put in my shopping cart if I don't know what to buy? Why?arrow_forwardWhy is hashing passwords better than encrypting them when keeping them in a file?arrow_forwardHash passwords instead of encrypting them while storing them.arrow_forward
- Computer Security is one of the fastest-moving fields in the world today. There are generally several incidents each week, including data breaches, large scale attacks, or some advancement in security research (i.e. new tools, techniques, vulnerabilities, or exploits). Select a recent event from your favorite security news source and summarize it. Include your source and an analysis of the event, including a summary of what happened, any new information from the event that changes current security practice, and any larger scale implications from the event. Relate the event to the topics in Chapter 1 of the book, namely the CIA triad, U.S. Compliance Laws (if any), IT domains, security policy, and/or data classification. In addition, relate the event to a biblical example.arrow_forwardHow are encrypted passwords saved by a password manager? Is it a USB drive, a website, a local file, or a clod?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education