+ Link For Assignments, GDBs & Online Quizzes Solution |
+ Link For Past Papers, Solved MCQs, Short Notes & More |
CS205 Information Security Assignment 01 Fall 2020 Solution / Discussion Due Date: 26-11-2020
Question No. 1 [Marks: 10]Question No. 1 [Marks: 10]
Suppose you are attempting the exam for the post of Information Security Engineer in the ABC organization. During the exam, you are given the following real life scenarios associated with the three main pillars of informing security (C.I.A) : Suppose fifty cancer patient's treatment is being carried out by Dr. Ali in the well-reputed cancer hospital in Lahore. All the medical information of those patients is stored in the table of the hospital’s database system. Dr. Ali suggests medicine to the patients on the basis of patient’s relevant information stored in the database. If another doctor who has also legal rights to access this table of the database, unintentionally changes the information that can mislead the patient treatment.CSS Exam’s applicants are checking their results online through the FPSC website but the FPSC website takes too much time to load.The AZB limited Bank makes a plan for launching a new offer for capturing customers in a market but this plan leaked to its competitors.A bank’s ATM is not responding due to general backend server error.If a renowned shoe brand’s prices and specifications available on online shopping stores are changed by an unauthorized person.If you are replying to the messages of your friend, then it should be received in the original form as it is sent by you.Upon the last date of applying for the online job application, the related website is not responding due to some technical problems which makes the candidates unable to submit their job application on time.Student’s board results information (Marks, CGPA) is considered very important and it should be available only for that specific student and their parents rather than other class students.A developer’s salary slip in the software house should not be visible to any other developer.Student’s semester grades are posted on the class Facebook group by some unauthorized student.After carefully reading and analyzing the above-mentioned scenarios and fill the following table: Scenario. No Associated C.I.A security component Scenario. No Associated C.I.A security component 1 Confidentiality 6 Integrity 2 Integrity 7 Integrity 3 Availability 8 Confidentiality 4 Availability 9 Availability 5 Confidentiality 10 Confidentiality
Solution:
Question No. 2 [Marks: 10]
You are required to carefully study the OSI security architecture and then identify and relate the following daily life scenarios with security services provided by OSI:
A Hotel front desk information officer is given the right to add visitor data on daily basis into the hotel database. He may be allowed to edit the information later on when required but not allowed to delete the record of any visitor.A bank’s regular customer sends an online query to the bank’s head office to know about his closing balance after ten weekly transactions and he should receive the same balance amount as sent by bank authorities.Mr. Hamza transfer $15000 to Car Company’s bank account through an online banking service for purchasing the new car. Both the bank and the user should be guaranteed in the identities of each other.A bank’s cash officer may be allowed to see just customer profile, but not allowed to make any changes in the customer profile information.A bank’s client withdraws Rs. 25000 from his bank account, but after some days he denied that he made the transaction. How the bank can handle such a situation?Note: You are required to provide your answer in the table given below:
Question No. 2 [Marks: 10]
You are required to carefully study the OSI security architecture and then identify and relate the following daily life scenarios with security services provided by OSI:
A Hotel front desk information officer is given the right to add visitor data on daily basis into the hotel database. He may be allowed to edit the information later on when required but not allowed to delete the record of any visitor.
A bank’s regular customer sends an online query to the bank’s head office to know about his closing balance after ten weekly transactions and he should receive the same balance amount as sent by bank authorities.
Mr. Hamza transfer $15000 to Car Company’s bank account through an online banking service for purchasing the new car. Both the bank and the user should be guaranteed in the identities of each other.
A bank’s cash officer may be allowed to see just customer profile, but not allowed to make any changes in the customer profile information.
A bank’s client withdraws Rs. 25000 from his bank account, but after some days he denied that he made the transaction. How the bank can handle such a situation?
Note: You are required to provide your answer in the table given below:
Tags:
+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)
+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)
+ Click Here to Search (Looking For something at vustudents.ning.com?) + Click Here To Join (Our facebook study Group)CS205_Assignment_No_01_Solution_Fall_2020
Click on the below link to download the file
CS205 Information Security Assignment 1 solution & discussion Fall 2020
Solution idea:
Student ID : BC180400273 CS205 –Information Security |
Total Marks: 20 Due Date: 26th November, 2020 |
|||||||||||||||||||||||||||||||||||||
Question No. 1 [Marks: 10] Suppose you are attempting the exam for the post of Information Security Engineer in the ABC organization. During the exam, you are given the following real life scenarios as 1. Suppose fifty cancer patient's treatment is being carried out by Dr. Ali in the well-reputed cancer hospital in Lahore. All the medical information of those patients is stored in the table of the hospital’s database system. Dr. Ali suggests medicine to the patients on the basis of patient’s relevant information stored in the database. If another doctor who has also legal rights to access this table of the database, unintentionally changes the information that can mislead the patient treatment.
3. The AZB limited Bank makes a plan for launching a new offer for capturing customers in a market but this plan leaked to its competitors.
5. If a renowned shoe brand’s prices and specifications available on online shopping stores are changed by an unauthorized person. 6. If you are replying to the messages of your friend, then it should be received in the original form as it is sent by you. 7. Upon the last date of applying for the online job application, the related website is not responding due to some technical problems which makes the candidates unable to submit their job application on time. 8. Student’s board results information (Marks, CGPA) is considered very important and it should be available only for that specific student and their parents rather than other class students. 9. A developer’s salary slip in the software house should not be visible to any other developer.
After carefully reading and analyzing the above-mentioned scenarios and fill the following table:
Solution:
Question No. 2 [Marks: 10] You are required to carefully study the OSI security architecture and then identify and relate the following daily life scenarios with security services provided by OSI:
Note: You are required to provide your answer in the table given below:
|
© 2021 Created by + M.Tariq Malik.
Powered by
Promote Us | Report an Issue | Privacy Policy | Terms of Service
We are user-generated contents site. All product, videos, pictures & others contents on site don't seem to be beneath our Copyrights & belong to their respected owners & freely available on public domains. We believe in Our Policy & do according to them. If Any content is offensive in your Copyrights then please email at m.tariqmalik@gmail.com Page with copyright detail & We will happy to remove it immediately.
Management: Admins ::: Moderators
Awards Badges List | Moderators Group
All Members | Featured Members | Top Reputation Members | Angels Members | Intellectual Members | Criteria for Selection
Become a Team Member | Safety Guidelines for New | Site FAQ & Rules | Safety Matters | Online Safety | Rules For Blog Post