CS 66717

subject Type Homework Help
subject Pages 6
subject Words 548
subject Authors Lawrie Brown, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The process of transforming input data that involves replacing alternate, equivalent
encodings by one common value is called _________.
______ virtualization systems are typically seen in servers, with the goal of improving
the execution efficiency of the hardware.
The three main types of intellectual property for which legal protection is available are:
copyrights, patents, and _______.
A ______ handles the financial transaction for issuing the digital license to the
consumer and pays royalty fees to the content provider and distribution fees to the
distributor accordingly.
page-pf2
The audit _______ are a permanent store of security-related events on a system.
The ___________ Act places restrictions on online organizations in the collection of
data from children under the age of 13.
User authentication is a procedure that allows communicating parties to verify that the
contents of a received message have not been altered and that the source is authentic.
page-pf3
It is likely that the organization will not have the resources to implement all the
recommended controls.
The ticket contains the user's ID, the server's ID, a __________, a lifetime after which
the ticket is invalid, and a copy of the same session key sent in the outer message to the
client.
The ticket-granting ticket is not reusable.
If encryption is used alone, _______ is used to convert the ciphertext to ASCII format.
page-pf4
A ________ cipher processes the input elements continuously, producing output one
element at a time as it goes along.
__________ access control controls access based on the roles that users have within the
system and on rules stating what accesses are allowed to users in given roles.
One of the simplest hash functions is the ________ of every block.
page-pf5
Key issues from a software security perspective are whether the implemented algorithm
correctly solves the specified problem, whether the machine instructions executed
correctly represent the high level algorithm specification, and whether the manipulation
of data values in variables is valid and meaningful.
Two key areas of concern for any input are the _______ of the input and the meaning
and interpretation of the input.
Activists are either individuals or members of an organized crime group with a goal of
financial reward.
The _______ plan documents what needs to be done for each selected control, along
with the personnel responsible, and the resources and time frame to be used.
page-pf6
IPsec provides two main functions: a combined authentication/encryption function
called ___________ and a key exchange function.
The authentication function determines who is trusted for a given purpose.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.