Bundle > SEC 571 - Principles Of Information Security And Privacy, Final exam (2 sets) complete solutions.

Bundle

SEC 571 - Principles Of Information Security And Privacy, Final exam (2 sets) complete solutions.

1. (TCO A) You are responsible for developing a security evaluation process that can be used to assess various operating systems both during and after development. List the five most desirable quali... ties your evaluation process should have and explain why they are important. (Be sure to address qualities of the evaluation process, not specific metrics for assessment of operating systems.) (Points : 40) The evaluation process can be approached and attempted with our own set of parameters. The desirable qualities that would be important for the evaluation process have been described below - Speed – This is to ensure that in the product is ready for the competitive market soonest possible, given that time is money and companies need to get their products out in the market as soon as possible Thoroughness – This is required to guarantee that all the various features and aspects of the product have been evaluated Portability – This quality ensures that the product is platform independent and that the evaluation is applicable without any platform related constraints or dependencies, thus allowing the evaluation process to be used for a range of systems and products Consistency – This criterion is to ensure that all similar products are judged and evaluated based on the same set of parameters, and that the same product when judged by different panels receive the same results Granularity – This is to ensure that the evaluation of the product is based on adequate level of detailing, which ensures that all parts of the system are evaluated effectively 2. (TCO B) The Open Systems Interconnection model is inherently inefficient. On the source host, each layer must take the work of higher layers, add some result, and pass the work to lower layers. On the destination host, each layer must process these results from lower layers and pass the appropriate information to upper layers. Surely this wrapping and unwrapping process is inefficient. Assess the security advantage of this layered approach. (Points : 40) As per the Open Systems Interconnection, or the OSI model, there are seven layers through which a message needs to pass from a source to a destination machine. Each of the layers perform different functionalities, and are together responsible for the complete and secure transmission of the message. Each layer performs some sort of function on the message before passing it to the next layer. This mechanism ensures high level of security. For example, at the source system, the seventh layer, or the Application layer interacts with the user and passes the message to the sixth or [Show More]

Last updated: 2 years ago

Bundle contains 2 items

Purchase Now

Instant download

OR
GET ASSIGNMENT HELP

Can't Find what you want?

Reviews( 0 )

Bundle

$22.00 $18.00

Purchase Now

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
1
0


More information


Uploaded On

Apr 09, 2022

Language

English

Type

Bundle

Number of Documents:

2

Seller


Nutmegs

Member since 3 years

76 Bundles Sold


THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.

What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·