Principles of computer security and what mechanisms

What are the three ‘principles’ of computer security and what ‘mechanisms’ can be used in achieving these principles?
Explain the role of a digital signature in information security.
What is the difference between Authentication and Identification?
“Password only security systems have a single point of failure.” (Moore, 2012) Compare and contrast the alternatives to ‘password only’ systems and select what you think is most feasible as a replacement in terms of rollout and cost.
Describe how Windows NT/2000/XP/2003 operating systems store passwords. Your answer should include the advantages and disadvantages of this approach.
Illustrate the tools and techniques used to harvest password hashes from a Windows based system and how these hashes may be subsequently cracked.
Why are LAN Manager (LM) hashes considered insecure?
What techniques can be employed to prevent Windows systems from storing LM-Hashes?

Order from us and get better grades. We are the service you have been looking for.