Professional Documents
Culture Documents
Exam 2
Exam 2
c-
H=2(1+1)+2(2+12)+2(3+23)+2(4+1)+2(5+25)+2(6+19)+2(7+22)+2(8+9)+
2(9+22)+2(10+1)+2(11+13)+2(12+1)+2(13+19)+2(14+18)=
2(2)+2(14)+2(26)+2(5)+ 2(27)+2(25)+2(29)+2(17)+2(31)+2(11)+2(24)+
2(13)+2(32)+2(32)=
4+28+52+10+54+50+58+34+62+22+48+26+64+64=576.
Question 2
A-What is meant By
-Profiles:The behavior of a subject (or a group of subjects) on an object (or
agroup of objects),include the description of normal behavior of subjects with
respect to the objects.
-Anomaly Records: Is created when the audit records show some abnormal
behaviorcompared to that in the profiles.
B-Explain the concept of the encryption and it’s type.
Is the process of transforming data into an unintelligible form in another a way
the original data can be obtained only by using the decryption process and the
encryption key. Types: The original data is called plain_text and the encrypted
data is called cipher data.
C-
Transmiting TondSesBhdAetnteeecmuthsMraydiet
B-Compare Between :
-Asymmetric => Uses one key for encryption and a different but related key for
decryption , Key encryption and is the basis of the public key schemes.
-Symmetric => Key encryption scheme uses the same key for encryption and
decryption .
- Private key => known only to the user.
-Public key => known to every one .
C-
Solution
-
Question 5
A- what is meant by audit trail and state Aduit requerments
Audit Trail: The process of automatic recording and saving of several
significant system events.
Audit Requirements :
1. Automatically collects information on all the security – sensitive activities.
2. Stores the information using a standard record format.
3. Creates and saves the audit records automatically without requiring any
action by the administrator.
4. Protects the audit records log under some security scheme.
5. Minimally affects the normal computer system operation and performance.
c-