Principles of computer security and what mechanisms

  • What are the three ‘principles’ of computer security and what ‘mechanisms’ can be used in achieving these principles?
  • Explain the role of a digital signature in information security.
  • What is the difference between Authentication and Identification?
  • “Password only security systems have a single point of failure.” (Moore, 2012) Compare and contrast the alternatives to ‘password only’ systems and select what you think is most feasible as a replacement in terms of rollout and cost.
  • Describe how Windows NT/2000/XP/2003 operating systems store passwords. Your answer should include the advantages and disadvantages of this approach.
  • Illustrate the tools and techniques used to harvest password hashes from a Windows based system and how these hashes may be subsequently cracked.
  • Why are LAN Manager (LM) hashes considered insecure?
  • What techniques can be employed to prevent Windows systems from storing LM-Hashes?
Order from us and get better grades. We are the service you have been looking for.