Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CS 461 / ECE 422 Information Assurance - HW #2, Assignments of Computer Science

True-false questions and descriptions for question 1-8 related to information assurance, security policy, cryptography, and network security. Students are required to answer these questions for homework submission.

Typology: Assignments

Pre 2010

Uploaded on 03/10/2009

koofers-user-sma
koofers-user-sma 🇺🇸

5

(1)

10 documents

1 / 1

Toggle sidebar

Related documents


Partial preview of the text

Download CS 461 / ECE 422 Information Assurance - HW #2 and more Assignments Computer Science in PDF only on Docsity!

CS 461 / ECE 422 Information Assurance HW # Due submitted to Compass by 3:00 p.m. Feb. 5 The questions below prefaced by T/F are true-false questions. For these you must select one or the other, but may clarify your answer with more text if you wish.

  1. T/F Security concerns are separate from software engineering concerns, so that an efficient way to design and implement software is to get its functionality right first, and later add security mechanisms.
  2. Describe the difference between a constraint, a requirement, and a control in a security policy.
  3. T/F Once a security policy has been established, one needs to review it and its effect on the system periodically but infrequently.
  4. T/F The only people who are needed to develop a security policy are security experts and application experts. Since management doesn’t understand either, it’s only role is to adopt the plan developed by the experts.
  5. Describe the difference between a business continuity plan, and an incident response plan
  6. T/F If one symmetric cryptographic method uses a longer key than another, it is more secure.
  7. T/F An important principle of symmetric cryptography is that keys and the data being encrypted are completely separate---in no way does a key depend on data values.
  8. T/F It is critical for the functional operation of a Feustel network that the operator that combines the output of the f function with half the result from the previous stage be an XOR. In other words, no other function could replace the XOR, with no other changes to the Feustel network, and still have the property that decrypting is the same as encrypting, but with a reversed key schedule.