ITEC852 Assignment 2017: Security Solutions and Analysis
VerifiedAdded on 2020/05/04
|5
|666
|59
Homework Assignment
AI Summary
This document presents solutions to the ITEC852 Assignment 2017, focusing on various aspects of computer security. The solutions address the Slammer code's attack, analyzing its exploitation of port 1434 and replication methods. The assignment explores cryptography concepts, including a key-based encryption method, and discusses the impact of ciphertext changes on plain text integrity. It also covers dictionary attacks, offering countermeasures to enhance security. Furthermore, the document delves into the concept of pseudo-randomness in generating PINs, contrasting it with hashing and algorithmic approaches. Finally, the assignment analyzes the security implications of different processor models, comparing the vulnerability of two-processor and four-processor systems, and discussing the benefits of native operating system support. The document references key sources like Mell and Grance (2011) and Bishop (2005).
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1 out of 5