Network Security:
Explain in detail how a hash function could be
used for each of the following applications. Indicate which
property or properties of the hash function are being used (one-way
property, fixed length output, collision resistance, etc...).
1. to detect unauthorized modification of software program
code
2. to identify the same files with different names on a
peer-to-peer sharing network
1.Describe a design pattern that incents good security
behavior.
2.Design a hash function that uses any desired date as
the salt. Demonstrate operation of the function, including input
values. Describe benefits and shortcomings of the hash
function.
Application security is one of the primary avenues used by
attackers to penetrate systems and networks. Some of these avenues
still being exploited have been known for decades. There has
historically been a wide gap between application developers and
security professionals—a gap that more organizations are becoming
motivated to bridge.
Discuss the following:
Differentiate between object-based and object-oriented computer
code.
Identify common avenues of vulnerability specific to
application security.
Explain strategies that mitigate application security
vulnerabilities.
Describe each of the 5 main types of cyber security:
1) Critical infrastructure security:
2) Application security:
3) Network Security:
4) Cloud security:
5) Internet of things security
Describe one application where a biodegradable polymer has been
used, and contrast this to an application where a biostable polymer
has been used. Your answer should be a comprehensive account of
each application, with diagrams if appropriate, with a specific
focus on the characteristics, of the relevant polymer category,
that make them suitable for the application. (Maximum 750 words
)
No Plagiarism and must be in your own words (300
Words)
Subject: Physical Security
Describe and explain some of the hardening methods of entry
control.