Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

IT279 Unit 3 Assignments, Assignments of Computer Science

Questions and answers related to cryptosystems and computer security. It covers topics such as confidentiality services, military classification scheme, authentication, cryptography, vulnerability, threat, and risk. The document cites references from the Purdue University Global Bookshelf. likely a set of study notes or an assignment for a university course on computer security or information systems.

Typology: Assignments

2023/2024

Available from 10/17/2023

Testfix
Testfix 🇬🇧

4.5

(13)

282 documents

1 / 7

Toggle sidebar

Related documents


Partial preview of the text

Download IT279 Unit 3 Assignments and more Assignments Computer Science in PDF only on Docsity! IT 279 UNIT 3 ASSIGNMENT 1 / Unit 3 Assignment Purdue University Global IT279 CISSP II 1. Which of the following are considered confidentiality services A. Encryption technologies B. Digital signatures C. RAID arrays “Access to data stored on secondary storage devices is one of the most critical issues facing computer security professionals. For hard disks, data can often be protected through a combination of operating system access controls. Removable media pose a greater challenge, so securing them often requires encryption technologies” (Chapple, Stewart, Gibson, 2018, p. 340). 2. Which service provided by a cryptosystem is most important for the military? A. Integrity B. Nonrepudiation C. Confidentiality “The United States (U.S.) military classification scheme is most concerned with the sensitivity of data and focuses on the protection of confidentiality (that is, the prevention of disclosure)” (Chapple, Stewart, Gibson, 2018 p. 21). 3. What is the purpose of authentication in a cryptosystem? A. Verifying the user's or system's identity B. Ensuring that data has not been changed by an unauthorized user IT 279 UNIT 3 ASSIGNMENT 2 / C. Ensuring that the data's sender cannot deny having sent the data “Authentication is the process of verifying or testing that a claimed identity is valid. Authentication requires information from the subject that must exactly correspond to the identity indicated” (Chapple, Stewart, Gibson, p. 42). 4. Which service provided by a cryptosystem turns information into unintelligible data? A. Authorization B. Integrity C. Confidentiality “First, cryptography protects the confidentiality (or secrecy) of information. Even when the transmission or storage medium has been compromised, the encrypted information is IT 279 UNIT 3 ASSIGNMENT 5 / A. Vulnerability B. Threat C. Risk “An attack is the exploitation of a vulnerability by a threat agent. In other words, an attack is any intentional attempt to exploit a vulnerability of an organization’s security infrastructure to cause damage, loss, or disclosure of assets. An attack can also be viewed as any violation or failure to adhere to an organization’s security policy” (Chapple, Stewart, Gibson, 2018, p. 66). IT 279 UNIT 3 ASSIGNMENT 6 / References Chapple, M., Stewart, J. M., Gibson, D. CISSP: Certified Information Systems Security Professional Official Study Guide. [Purdue University Global Bookshelf]. Retrieved from https://purdueuniversityglobal.vitalsource.com/#/books/9781119475873/ Miller, L. C., Gregory, P. H. CISSP For Dummies. [Purdue University Global Bookshelf]. Retrieved from https://purdueuniversityglobal.vitalsource.com/#/books/9781119210252/ IT 279 UNIT 3 REPORT CARD Total number of Quiz taken : 3 Total number of Questions taken: 1044 Total number of Answers provided 1079 Total Unique Question Taken = abd Please select a certification then click on the OK button: select Certificate . Ea
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved