Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Pro Blog
  • Users
  • Groups
  • Unsolved
  • Solved
Collapse
Secnto AI
  1. Secnto AI
  2. Categories
  3. Virtual University
  4. CS315 - Network Security
  5. CS315 Assignment 1 Solution and Discussion
CS315 Assignment 1 Solution and Discussion
M
Re: CS315 Assignment 1 Solution and Discussion Assignment No. 01 Semester: Spring 2020 Network Security-CS315 Total Marks: 20 Due Date: 29-May, 2020 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx).  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc). Objectives: To enhance the learning capabilities of students about Network Security Requirements and Algorithms. Assignment Question 1: Marks 14 Carefully analyze the scenarios/problems mentioned below and suggest the most suitable security requirements that should be fulfilled by the organizations to overcome their respective problem(s). ABC Bank is providing credit card services to its clients. One of its clients Mr. Amir lost his credit card and he received an email of credit card transaction from the bank. XYZ Soft wants to check that which employee has accessed their system after office working hours but it is unable to trace the employee because organization don’t keep any system logs. ITC University is providing access to its students of their results through online portal but one of its students is executing scripts to access the server again and again that causes the server to get down. A student takes admission in the university. After a year, university found that student’s actual information is not matching with the information entered in the university’s database. A doctor in a hospital detected that one of its patient’s information has been altered by one of the medical staff who was not authorized to access that information. Glass Soft is providing online gaming facility to end users but one of its employees leaked the information and now users getting spam messages. Chatbot organization is providing online chatting services to its users. It’s two users A and B are chatting with each other while some user C is sending message to A while pretending that it’s B. Question 2: Marks 06 Given tables contain the combinations of Plain text, Cipher text and Key Stream. You are required to discover Cipher text and Key stream in binary form while Plain text in decimal form with the help of stream cipher algorithm using following data: a) Given plain text and key stream. Discover Cipher Text (binary). Plain Text Key Stream Cipher Text 01010111 11011101 ? b) Given cipher text and key stream. Discover Plain Text (decimal). Cipher Text Key Stream Plain Text 011011101 101110110 ? c) Given plain text and cipher text. Discover Key Stream(binary). Plain Text Cipher Text Key Stream 101110110 011010101 ?
CS315 - Network Security
CS315 Lecture Handout and Videos Download
zareenZ
video
CS315 - Network Security
CS315 Assignment 3 Solution and Discussion
zareenZ
Assignment No. 03 Semester: Fall 2019 Network Security-CS315 Total Marks: 20 Due Date: 23-Jan-2020 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx).  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc.).  Assignment solution submitted in image format or image(s) pasted in the solution file. Objective: To enhance the knowledge about Cloud Security and Virus Attacks involved in Network Security. Assignment Question No.1: 10 Marks Different organizations are providing cloud services to their clients/users/customers and suffering from the various issues. Which countermeasures these organizations can use to avoid following issues: ABC Organization is providing free email services to end users but some unknown person is using it for spamming. An organization requires Signup access to its free cloud storage services. The administrators of the organization can view and manage user data. After some days, one of the administrators leaked users’ data. Now users are receiving spam emails and SMS. A Bank is providing credit card services to its customers. A person lost his credit card and he received an Email/SMS of credit card transaction from bank. A Multinational organization is providing credentials to their employees to access their online portal and manage their services. One of the employees stuck in some problem and provide credentials to third person outside the organization for help. After somedays organization detected that their critical services are controlled and manipulated by some anonymous person. XYZ University is providing access to its students to their result and other online portals but one of its students is executing scripts to access the server again and again until the server gets down. Question No.2: 10 Marks Suppose a system is infected with a virus and functioning abnormally. Before virus is diagnosed, some malicious activates are being faced by the user. Now during the virus lifetime in the system, it will go through different phases. You need to identify its phases for the following mentioned scenarios: Scenario Phase User run IDM (Internet Download Manager) application in the system then instead of execution, it creates multiple files in different portions of hard disk. User tries to open any file but system shutdown immediately and damage operating system files. User opened a file but instead of executing that file it executed another file in infinite loop. User open PDF reader application and virus got activated. On opening an excel file, a virus just created two different copies of it. Best of Luck!
CS315 - Network Security
CS315 Assignment 2 Solution and Discussion
zareenZ
Assignment No. 02 Semester: Fall 2019 Network Security-CS315 Total Marks: 20 Due Date: 28/11/2019 Instructions: Please read the following instructions carefully before submitting assignment: You need to use MS word document to prepare and submit the assignment on VU-LMS. It should be clear that your assignment will not get any credit if:  The assignment is submitted after due date.  The assignment is not in the required format (doc or docx).  The submitted assignment does not open or file is corrupt.  Assignment is copied (partial or full) from any source (websites, forums, students, etc.). Objective: To enhance the knowledge about Cryptographic techniques involving symmetric and asymmetric algorithms. Assignment Question No.1: 10 Marks Message authentication in “One-way Hash” function can be implemented with and without encryption. Considering the scenario where a message is authenticated without encryption between two stations, you are required to answer the following questions: a) What will be component of the message sent from station A and received at station B? b) What component of the message will ensure at receiving station that message is not corrupted? Question No.2: 10 Marks Cryptography is usually done by using Symmetric and Asymmetric encryption algorithms like Public-key encryption algorithms and Hash functions respectively. How would you differentiate Public-key encryption algorithms and Hash functions on the basis of following? a) Mechanism of mathematical operations. b) Number of keys being used for cryptography. Best of Luck!
CS315 - Network Security
CS315 Assignment 1 Solution and Discussion
zareenZ
Topic thumbnail image
CS315 - Network Security

CS315 Assignment 1 Solution and Discussion

Scheduled Pinned Locked Moved Solved CS315 - Network Security
cs315assignment 1solutiondiscussionfall 2019
7 Posts 1 Posters 2.0k Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • zareenZ Offline
    zareenZ Offline
    zareen
    Cyberian's Gold
    wrote on last edited by
    #1

    Assignment No. 01
    Semester: Fall 2019
    Network Security-CS315 Total Marks: 20

    Due Date: 15/11/2019

    Instructions:
    Please read the following instructions carefully before submitting assignment:
    You need to use MS word document to prepare and submit the assignment on VU-LMS.
    It should be clear that your assignment will not get any credit if:

     The assignment is submitted after due date.
     The assignment is not in the required format (doc or docx)
     The submitted assignment does not open or file is corrupt.
     Assignment is copied (partial or full) from any source (websites, forums, students, etc)

    Objective:

    To learn about Network Security Requirements and administrative tasks.

    Assignment

    Question 1: Marks 10

    Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

    1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

    2- ATM service is down since morning.

    3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

    4- A student has got his university card, but with a picture of some other student on it.

    5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

       Question # 2 on next page. 
    

    Question 2: Marks 10

    Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.

    d424544a-6ddb-4d20-b76e-8f05624096c5-image.png

    Best of Luck!

    Discussion is right way to get Solution of the every assignment, Quiz and GDB.
    We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
    Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
    %(red)[NOTE: Don't copy or replicating idea solutions.]
    Quiz Copy Solution
    Mid and Final Past Papers
    Live Chat

    zareenZ 5 Replies Last reply
    0
    • zareenZ zareen

      Assignment No. 01
      Semester: Fall 2019
      Network Security-CS315 Total Marks: 20

      Due Date: 15/11/2019

      Instructions:
      Please read the following instructions carefully before submitting assignment:
      You need to use MS word document to prepare and submit the assignment on VU-LMS.
      It should be clear that your assignment will not get any credit if:

       The assignment is submitted after due date.
       The assignment is not in the required format (doc or docx)
       The submitted assignment does not open or file is corrupt.
       Assignment is copied (partial or full) from any source (websites, forums, students, etc)

      Objective:

      To learn about Network Security Requirements and administrative tasks.

      Assignment

      Question 1: Marks 10

      Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

      1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

      2- ATM service is down since morning.

      3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

      4- A student has got his university card, but with a picture of some other student on it.

      5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

         Question # 2 on next page. 
      

      Question 2: Marks 10

      Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.

      d424544a-6ddb-4d20-b76e-8f05624096c5-image.png

      Best of Luck!

      zareenZ Offline
      zareenZ Offline
      zareen
      Cyberian's Gold
      wrote on last edited by zareen
      #6

      Q.1
      Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

      Q.1 Solution:
      1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

      • Accountability

      2- ATM service is down since morning.

      • Availability

      3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

      • Confidentiality

      4- A student has got his university card, but with a picture of some other student on it.

      • Integrity

      5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

      • Authenticity

      Q.2
      Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to match the case of column A to the column B.
      Q.2 Solution:

      a49f5db8-9e42-41b6-8167-f94ef19c692d-image.png

      Discussion is right way to get Solution of the every assignment, Quiz and GDB.
      We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
      Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
      %(red)[NOTE: Don't copy or replicating idea solutions.]
      Quiz Copy Solution
      Mid and Final Past Papers
      Live Chat

      1 Reply Last reply
      0
      • zareenZ zareen

        Assignment No. 01
        Semester: Fall 2019
        Network Security-CS315 Total Marks: 20

        Due Date: 15/11/2019

        Instructions:
        Please read the following instructions carefully before submitting assignment:
        You need to use MS word document to prepare and submit the assignment on VU-LMS.
        It should be clear that your assignment will not get any credit if:

         The assignment is submitted after due date.
         The assignment is not in the required format (doc or docx)
         The submitted assignment does not open or file is corrupt.
         Assignment is copied (partial or full) from any source (websites, forums, students, etc)

        Objective:

        To learn about Network Security Requirements and administrative tasks.

        Assignment

        Question 1: Marks 10

        Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

        1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

        2- ATM service is down since morning.

        3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

        4- A student has got his university card, but with a picture of some other student on it.

        5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

           Question # 2 on next page. 
        

        Question 2: Marks 10

        Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.

        d424544a-6ddb-4d20-b76e-8f05624096c5-image.png

        Best of Luck!

        zareenZ Offline
        zareenZ Offline
        zareen
        Cyberian's Gold
        wrote on last edited by
        #2

        @zareen said in CS315 Assignment 1 Solution and Discussion:

        1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

        With the advent of audit trail programs, organizations can precisely monitor who has had access to patient information.
        Administrators can even detail what reports were printed, the number of screen shots taken, or the exact location and computer used to submit a request. Alerts are often set to flag suspicious or unusual activity, such as reviewing information on a patient one is not treating or attempting to access information one is not authorized to view, and administrators have the ability to pull reports on specific users or user groups to review and chronicle their activity. Software companies are developing programs that automate this process.

        Discussion is right way to get Solution of the every assignment, Quiz and GDB.
        We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
        Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
        %(red)[NOTE: Don't copy or replicating idea solutions.]
        Quiz Copy Solution
        Mid and Final Past Papers
        Live Chat

        1 Reply Last reply
        0
        • zareenZ zareen

          Assignment No. 01
          Semester: Fall 2019
          Network Security-CS315 Total Marks: 20

          Due Date: 15/11/2019

          Instructions:
          Please read the following instructions carefully before submitting assignment:
          You need to use MS word document to prepare and submit the assignment on VU-LMS.
          It should be clear that your assignment will not get any credit if:

           The assignment is submitted after due date.
           The assignment is not in the required format (doc or docx)
           The submitted assignment does not open or file is corrupt.
           Assignment is copied (partial or full) from any source (websites, forums, students, etc)

          Objective:

          To learn about Network Security Requirements and administrative tasks.

          Assignment

          Question 1: Marks 10

          Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

          1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

          2- ATM service is down since morning.

          3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

          4- A student has got his university card, but with a picture of some other student on it.

          5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

             Question # 2 on next page. 
          

          Question 2: Marks 10

          Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.

          d424544a-6ddb-4d20-b76e-8f05624096c5-image.png

          Best of Luck!

          zareenZ Offline
          zareenZ Offline
          zareen
          Cyberian's Gold
          wrote on last edited by
          #3

          @zareen said in CS315 Assignment 1 Solution and Discussion:

          Assignment No. 01
          Semester: Fall 2019
          Network Security-CS315 Total Marks: 20

          Due Date: 15/11/2019

          Instructions:
          Please read the following instructions carefully before submitting assignment:
          You need to use MS word document to prepare and submit the assignment on VU-LMS.
          It should be clear that your assignment will not get any credit if:

           The assignment is submitted after due date.
           The assignment is not in the required format (doc or docx)
           The submitted assignment does not open or file is corrupt.
           Assignment is copied (partial or full) from any source (websites, forums, students, etc)

          Objective:

          To learn about Network Security Requirements and administrative tasks.

          Assignment

          Question 1: Marks 10

          Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

          1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

          2- ATM service is down since morning.

          3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

          4- A student has got his university card, but with a picture of some other student on it.

          5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

             Question # 2 on next page. 
          

          Question 2: Marks 10

          Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.

          d424544a-6ddb-4d20-b76e-8f05624096c5-image.png

          Best of Luck!

          In the networking system information communicates in communicational lines .Normalinformation transmission will communicate in the traditional type of however confidentialinformation might transmit within the kind of encrypted form o that no-one will hack the directionfrom communicational lines. The banking sector is one in all the vital sector wherever all sort ofmonetary data send through the communicational lines and it desires the high security ofknowledge. Varied encryption algorithms are a unit want to defend the info among a networkfor electronic communication. Automated teller machines is additionally associate degree examplewherever we’d like high security of knowledge in terms of knowledge communication fromAutomated teller machines to bank Server and contrariwise

          Discussion is right way to get Solution of the every assignment, Quiz and GDB.
          We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
          Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
          %(red)[NOTE: Don't copy or replicating idea solutions.]
          Quiz Copy Solution
          Mid and Final Past Papers
          Live Chat

          1 Reply Last reply
          0
          • zareenZ zareen

            Assignment No. 01
            Semester: Fall 2019
            Network Security-CS315 Total Marks: 20

            Due Date: 15/11/2019

            Instructions:
            Please read the following instructions carefully before submitting assignment:
            You need to use MS word document to prepare and submit the assignment on VU-LMS.
            It should be clear that your assignment will not get any credit if:

             The assignment is submitted after due date.
             The assignment is not in the required format (doc or docx)
             The submitted assignment does not open or file is corrupt.
             Assignment is copied (partial or full) from any source (websites, forums, students, etc)

            Objective:

            To learn about Network Security Requirements and administrative tasks.

            Assignment

            Question 1: Marks 10

            Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

            1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

            2- ATM service is down since morning.

            3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

            4- A student has got his university card, but with a picture of some other student on it.

            5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

               Question # 2 on next page. 
            

            Question 2: Marks 10

            Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.

            d424544a-6ddb-4d20-b76e-8f05624096c5-image.png

            Best of Luck!

            zareenZ Offline
            zareenZ Offline
            zareen
            Cyberian's Gold
            wrote on last edited by
            #4

            @zareen said in CS315 Assignment 1 Solution and Discussion:

            Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

            The credit card company can decide you owe the disputed amount when there’s a disagreement between you and a merchant over a charge you agreed to. But in a case where you didn’t authorize the charge, there is more protection available for you. If your credit card was stolen and then used to make purchases, the company can’t make you pay more than 50 of the unauthorized amount, as the Federal Trade Commission explains. And if only the card number was stolen, so that you are still holding on to the physical card, you’re not obligated to pay any unauthorized charges.

            Discussion is right way to get Solution of the every assignment, Quiz and GDB.
            We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
            Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
            %(red)[NOTE: Don't copy or replicating idea solutions.]
            Quiz Copy Solution
            Mid and Final Past Papers
            Live Chat

            1 Reply Last reply
            0
            • zareenZ zareen

              Assignment No. 01
              Semester: Fall 2019
              Network Security-CS315 Total Marks: 20

              Due Date: 15/11/2019

              Instructions:
              Please read the following instructions carefully before submitting assignment:
              You need to use MS word document to prepare and submit the assignment on VU-LMS.
              It should be clear that your assignment will not get any credit if:

               The assignment is submitted after due date.
               The assignment is not in the required format (doc or docx)
               The submitted assignment does not open or file is corrupt.
               Assignment is copied (partial or full) from any source (websites, forums, students, etc)

              Objective:

              To learn about Network Security Requirements and administrative tasks.

              Assignment

              Question 1: Marks 10

              Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

              1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

              2- ATM service is down since morning.

              3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

              4- A student has got his university card, but with a picture of some other student on it.

              5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

                 Question # 2 on next page. 
              

              Question 2: Marks 10

              Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.

              d424544a-6ddb-4d20-b76e-8f05624096c5-image.png

              Best of Luck!

              zareenZ Offline
              zareenZ Offline
              zareen
              Cyberian's Gold
              wrote on last edited by zareen
              #5

              @zareen said in CS315 Assignment 1 Solution and Discussion:

              A student has got his university card, but with a picture of some other student on it.

              The CPU of another computer was done-in by an overdose of acid and a set of wire snips. … University students in Massachusetts captured a computer center and used it … in assessing his physical security risks and then planning and implementing … The picture badge had its day but it allowed an assortment of “apes and …

              @zareen said in CS315 Assignment 1 Solution and Discussion:

              The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

              This policy sets out how we will treat your personal information and explains how we … A cookie is a text file that is placed on your hard disk by a web page server. … It does not correspond to any user ID in your web application, and does not store any …

              Discussion is right way to get Solution of the every assignment, Quiz and GDB.
              We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
              Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
              %(red)[NOTE: Don't copy or replicating idea solutions.]
              Quiz Copy Solution
              Mid and Final Past Papers
              Live Chat

              1 Reply Last reply
              0
              • zareenZ zareen

                Assignment No. 01
                Semester: Fall 2019
                Network Security-CS315 Total Marks: 20

                Due Date: 15/11/2019

                Instructions:
                Please read the following instructions carefully before submitting assignment:
                You need to use MS word document to prepare and submit the assignment on VU-LMS.
                It should be clear that your assignment will not get any credit if:

                 The assignment is submitted after due date.
                 The assignment is not in the required format (doc or docx)
                 The submitted assignment does not open or file is corrupt.
                 Assignment is copied (partial or full) from any source (websites, forums, students, etc)

                Objective:

                To learn about Network Security Requirements and administrative tasks.

                Assignment

                Question 1: Marks 10

                Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

                1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

                2- ATM service is down since morning.

                3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

                4- A student has got his university card, but with a picture of some other student on it.

                5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

                   Question # 2 on next page. 
                

                Question 2: Marks 10

                Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to select the correct option in column B for each case of column A. Write your option in column C.

                d424544a-6ddb-4d20-b76e-8f05624096c5-image.png

                Best of Luck!

                zareenZ Offline
                zareenZ Offline
                zareen
                Cyberian's Gold
                wrote on last edited by zareen
                #6

                Q.1
                Consider the following scenarios and identify which Security Requirements could be applied to each of scenario.

                Q.1 Solution:
                1- A Dr finds that the patient history is wrong. Hospital information software DETECTS from its log that a nurse has altered that history of patient.

                • Accountability

                2- ATM service is down since morning.

                • Availability

                3- Ali did not use his credit card on Sunday but still he received an email which tell him that his credit card has been used.

                • Confidentiality

                4- A student has got his university card, but with a picture of some other student on it.

                • Integrity

                5- The personal information provided by the customer on web page do not match with his actual NIC that he is carrying.

                • Authenticity

                Q.2
                Keeping in mind the different administrative approaches for information security and expected attack for information retrieval, you are required to match the case of column A to the column B.
                Q.2 Solution:

                a49f5db8-9e42-41b6-8167-f94ef19c692d-image.png

                Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                %(red)[NOTE: Don't copy or replicating idea solutions.]
                Quiz Copy Solution
                Mid and Final Past Papers
                Live Chat

                1 Reply Last reply
                0
                • zareenZ Offline
                  zareenZ Offline
                  zareen
                  Cyberian's Gold
                  wrote on last edited by
                  #7

                  https://youtu.be/wMN0pCyjQ9E

                  Discussion is right way to get Solution of the every assignment, Quiz and GDB.
                  We are always here to discuss and Guideline, Please Don't visit Cyberian only for Solution.
                  Cyberian Team always happy to facilitate to provide the idea solution. Please don't hesitate to contact us!
                  %(red)[NOTE: Don't copy or replicating idea solutions.]
                  Quiz Copy Solution
                  Mid and Final Past Papers
                  Live Chat

                  1 Reply Last reply
                  0

                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  How to Build a $1,000/Month PAK VS BAN Live Live Cricket Streaming
                  File Sharing
                  Earn with File Sharing

                  0

                  Online

                  3.0k

                  Users

                  2.8k

                  Topics

                  8.2k

                  Posts
                  solution
                  1235
                  discussion
                  1195
                  fall 2019
                  813
                  assignment 1
                  428
                  assignment 2
                  294
                  spring 2020
                  265
                  gdb 1
                  238
                  assignment 3
                  79
                  • PM. IMRAN KHAN
                    undefined
                    4
                    1
                    4.0k

                  • Are the vaccines halal or not?
                    undefined
                    4
                    1
                    3.8k

                  • All Subjects MidTerm and Final Term Solved Paper Links Attached Please check moaaz past papers
                    zaasmiZ
                    zaasmi
                    3
                    26
                    75.1k

                  • CS614 GDB Solution and Discussion
                    M
                    moaaz
                    3
                    3
                    8.1k

                  • How can I receive Reputation earning from Cyberian? 100% Discount on Fee
                    Y
                    ygytyh
                    3
                    28
                    23.9k
                  | |
                  Copyright © 2010-26 RUP Technologies LLC. USA | Contributors | Privacy | Terms
                  • Login

                  • Don't have an account? Register

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • Pro Blog
                  • Users
                  • Groups
                  • Unsolved
                  • Solved