Principles of computer security and what mechanisms
- What are the three ‘principles’ of computer security and what ‘mechanisms’ can be used in achieving these principles?
- Explain the role of a digital signature in information security.
- What is the difference between Authentication and Identification?
- “Password only security systems have a single point of failure.” (Moore, 2012) Compare and contrast the alternatives to ‘password only’ systems and select what you think is most feasible as a replacement in terms of rollout and cost.
- Describe how Windows NT/2000/XP/2003 operating systems store passwords. Your answer should include the advantages and disadvantages of this approach.
- Illustrate the tools and techniques used to harvest password hashes from a Windows based system and how these hashes may be subsequently cracked.
- Why are LAN Manager (LM) hashes considered insecure?
- What techniques can be employed to prevent Windows systems from storing LM-Hashes?
Order from us and get better grades. We are the service you have been looking for.