Module Assignments
For this module you are required to complete the following assignments:
Chapter 12: exercises # 1 - 6, and 11
1. A major university in Illinois used to place the computer output from student jobs on a table in the computer room. This room is the same computer room that housed all the campus' mainframe computers and supporting devices. Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?
2. You have forgotten your password, so you call the help desk and ask them to retrieve your password. After a few moments, they tell you your forgotten password. What has just happened and what is its significance?
3. Create (on paper) a simple example of a substitution-based cipher.
4. Create (on paper) a simple example of a transposition-based cipher.
5. Using the Vigenére Cipher and the key NETWORK, encode the phrase "this is an interesting class."
6. Using the transposition-based cipher from this chapter and the same key, COMPUTER, encode the phrase "birthdays should only come once a year."
11. One feature of a firewall is its ability to stop an outgoing IP packet, remove the real IP address, insert a "fake" IP address, and send the packet on its way. How does this feature work? Do you think it would be effective?
Thinking Outside the Box
You have a computer at home with a wireless MIC and wireless router. List all the security measures that should be employed so that your home network is secure.