Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Computer Science Assignment

1

CSCI 351 Assignment 2
60 points + 5 bonus points

Instruction:

• Show your own work (at least 50% penalty otherwise)

• Submit a single WORD document (*.doc or *docx only) containing all your
answers to the assignment folder (“Assignment 1”) under D2L (at least 10%
penalty otherwise)

• Make sure you submit the intended one. It is recommended that you download
what has been uploaded and double-check if the correct document has been
submitted.

• You can submit as many times as you want, but the last submission will only be
graded. If the last submission is made after the deadline, there will be a late
submission penalty.

• No plagiarism: Do not copy and paste any from textbooks and other resources to
answer questions (Zero points will be given otherwise).

o Turnitin file similarity should be less than 10%

• AI misuse or AI writing detection (
writing/)

o Should be less than 10%

• No resubmission/extension request will be accepted.

Problem 1. Problem analysis (20 pt. 5pt. each)

Next Generation 911 (commonly referred to as NG911) is a digital, internet protocol (IP)-
based system that will replace the analog 911 infrastructure that’s been in place for
decades (
procurement-guidance,
generation-911-procurement-guidance). Please check the following three videos for more
information related to NG911.

• What is the next generation 9-1-1?
o

• Benefits of NG911 for Law Enforcement
o

onal911Program

• Got 11 Min? Here’s Why NG911 is more Cost Efficient than E911
o

cher%2CENP

Consider you are a user or service provider (local emergency medical, first, or law
enforcement agencies). Use your own words and give at least TWO examples given the
confidentiality, integrity, and availability requirements associated with the system. Which
one is a more important security requirement compared to the others?

a. Confidentiality

2

b. Integrity

c. Availability

d. Which one is more important, or which one is less important? Explain why.

e. (5 bonus points) If possible, list three research/open questions related to NG911
by doing some research.

Problem 2. Classify each of the following as a violation of Confidentiality (C),
Integrity (I), Availability (A), Assurance (AS), Authenticity (AU), or some
combination of these. (25 pt. 2.5 pt each)

a. Bob eavesdrops on Alice’s text messages.

b. Bob crashes Alice’s system.

c. Bob changes the amount of Alice’s check from $100 to $1,000.

d. Bob forges Alice’s signature on a deed.

e. Bob registers the domain name “Costco.com” and refuses to let the company buy or
use that domain name.

f. Bob intercepts Alice’s email message, changes the text, and forwards it to the intended
recipient.

g. Bob is the software developer of the myleo system. Bob left a backdoor in the system
so that he could access the system without 2-Step authentication.

h. Bob obtains Alice’s credit card number and has the credit card company cancel the
card and replace it with another card bearing a different account number.

i. Bob spoofs Alice’s IP address to gain access to her computer.

j. Bob sends spam using his @tamuc.edu email address.

3

Problem 3. Access Control (15 pt., 5 pt. each)

Assumption:

• Privileges: read (“R”), write (“W”), execute (“X”)
• Resources:

– Image files: tamuc.jpg, jessM.png, csci351.gif
– Document files: syllabus.doc, lecture.ppt, assign01.odt
– Binary files: a.exe, b.exe, c.exe, m.dmg
– Video files: lecture01.mp4, lecture02.mp4
– Web files: week1.html, week2.html, week3.php

• Access permissions:
– A has the privilege to read all the document files.
– B has the privilege to read and write all the images files.
– B and C have the privilege to read “syllabus.doc”
– A and C have the privilege to read and execute “a.exe”, “b.exe”.
– C and D have the privilege to read jessM.png.
– D has the privilege to read and write all video files.
– All users have the privilege to read all web files.
– E has the privilege to read and write all web files.

a. Construct the corresponding access control matrix. To answer, use the format in Table

1.1 in the textbook.

b. Construct the corresponding access control list. To answer, use the format in Figure

1.5 in the textbook.

c. Construct the corresponding capabilities list. To answer, use the format in Figure 1.6

in the textbook.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?