Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 12.7, Problem 3SGDQ
Explanation of Solution
Mention how the situation that a person across the hallway in dorm can copy file using shared network is different from packet sniffing:
- The situation that another person across the hallway copies the person’s MIS project by obtaining the name of computer and logon name by using the dorm’s network to access shared folder is actually a case of unauthorized access of a file stored on a file share.
- It is different from packet sniffing as packet sniffing is a situation in which data are intercepted in the middle while flowing in a network.
- Packet sniffing can be considered as a man-in-the-middle situation whereas data can be sniffed midway through the flow...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Is it possible to encrypt both the data and the connection from beginning to end? What are the advantages of doing this? Please provide an example of a situation in which the use of encryption might be advantageous.
Do you prefer the phrase "network sniffing" or "wiretapping," given the similarities between these two practices? Is there anything about them that causes others to see them as potential dangers in a more subtle way?
The easiest way to describe my understanding of multi-factor authentication is to call it unsophisticated. What exactly does it do to stop someone from stealing your password, and how exactly does it achieve that?
Chapter 12 Solutions
Using MIS (10th Edition)
Ch. 12.4 - Prob. 1EGDQCh. 12.4 - Prob. 2EGDQCh. 12.4 - Prob. 3EGDQCh. 12.4 - Prob. 4EGDQCh. 12.4 - Prob. 6EGDQCh. 12.4 - Prob. 7EGDQCh. 12.4 - Prob. 8EGDQCh. 12.4 - Prob. 9EGDQCh. 12.4 - Prob. 10EGDQCh. 12.6 - Sports are one area in which the collection and...
Ch. 12.6 - Prob. 2BOIQCh. 12.6 - Prob. 3BOIQCh. 12.6 - Prob. 4BOIQCh. 12.7 - Prob. 1SGDQCh. 12.7 - Prob. 2SGDQCh. 12.7 - Prob. 3SGDQCh. 12.7 - Prob. 4SGDQCh. 12.7 - Prob. 5SGDQCh. 12.7 - Prob. 6SGDQCh. 12.7 - Prob. 7SGDQCh. 12.7 - Prob. 1CGDQCh. 12.7 - Prob. 2CGDQCh. 12.7 - Prob. 3CGDQCh. 12.7 - Prob. 4CGDQCh. 12.7 - Prob. 5CGDQCh. 12.7 - Prob. 12.1ARQCh. 12.7 - Prob. 12.2ARQCh. 12.7 - Prob. 12.3ARQCh. 12.7 - What are the phases in the systems development...Ch. 12.7 - What are the keys for successful SDLC projects?...Ch. 12.7 - How can scrum overcome the problems of the SDLC?...Ch. 12.7 - Prob. 12.7ARQCh. 12 - Prob. 12.1UYKCh. 12 - Prob. 12.4UYKCh. 12 - Prob. 12.5UYKCh. 12 - Prob. 12.6CE12Ch. 12 - Prob. 12.7CE12Ch. 12 - Prob. 12.8CE12Ch. 12 - Prob. 12.9CE12Ch. 12 - Describe three reasons why cases like this will...Ch. 12 - Prob. 12.11CS12Ch. 12 - Prob. 12.12CS12Ch. 12 - The project was known to be in trouble, but it...Ch. 12 - Prob. 12.14CS12
Knowledge Booster
Similar questions
- Make a distinction between spoofing and session hijacking. In the case that you're a web user, what are some of the countermeasures you use to protect yourself against session hijacking?arrow_forwardWhich of our objectives would be most likely to be achieved if we had authentication support? The following are the benefits and drawbacks of different authentication methods.arrow_forwardUnderstanding the objectives of authentication is critical. How do the different methods of authentication stack up, both positively and negatively, when compared to one another?arrow_forward
- What is the difference between Non-Repudiation and Anonymity Protocols? Explain the Non-Repudiation Protocol's Goals and the Zhou-Gollman Non-Repudiation Protocol.arrow_forwardOutline a number of methods that can be used to steal a session. What countermeasures would you take if you were the target of such an attack?arrow_forwardIn terms of the number of encryption operations required to transfer a large file, compare cypher block chaining versus cypher feedback mode. How much more efficient is one than the other, and how much more efficient is one?arrow_forward
- Authorization lists need to be encrypted and secured since they are so vulnerable to manipulation. Suppose these files were accidently changed; what would happen?arrow_forwardNeed the below questions answered: 1) Suppose that a merchant’s website stores hashed passwords that have not been salted. Describe an attack to obtain passwords that could be prevented using salted passwords. (Remember, hashes cannot be "decrypted") 2) You know that it is generally not a good practice to create your own authentication systems when standard packages are available to you. But for the purposes of learning, you are doing it anyway. You are trying to decide which hashing algorithm to use when salting and hashing user passwords for the webapp you are building. Of the following hashing algorithms, which is best for hashing passwords? What makes your choice the best option for this scenario? SHA512 MD5 Bcrypt SHA256 3) There are several options for password hashing algorithms other than your choice from above. Do a little Internet investigation and discuss an equivalent or better option than your previous choice. Are there any parameters or settings to that algorithm…arrow_forwardPPP authentication may be established using PAP or CHAP. Is one more secure in this position than the other? Do you feel compelled to expand upon your response?arrow_forward
- Assume that you want to make the message available to the users who are authorized to read the respective message. Each message contains some confidential data; therefore, instead of sending the plain text to each user, you decided to encrypt each message using secret key encryption and make the encrypted messages available for read. You need to distribute the encryption keys with the encryption methods to the authorized users. The communication channel between the users and the website is insecure; however, the pubic keys of the users are encrypted through double encryption methods for 2-layer of authentication mechanism and convert into cipher text as follows. The following cipher message was produced using the Rail Fence algorithm with 3 rails: “WECRLTEERDSOEEFEAOCAIVDEN” What is the corresponding plain text?What’s wrong with the shift cipher? Provide any three reasons.arrow_forwardDo you understand "poison packet assault" and how to avoid it? Provide examples of your assertions.arrow_forwardIs it possible to encrypt the connection as well as the data from beginning to end?What benefit does this bring?Give an example of a case where any type of encryption might be beneficial.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education