Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!


CSIS 4010 Computer Security

CSIS 4010 Computer Security

CSIS 4010 Computer Security

1. Text reading


Chapters 12, 13, 20, 21, 22


2. Textbook questions (80 points)


Chapter 12


Review questions:


12.3 What are the basic steps needed to secure the base operating system?

12.6 What is the point of removing unnecessary services, applications, and protocols?

12.19 What are the major differences between the implementation of discretionary access control models on Unix and Linux systems that those on Windows systems?




12.3 Why are file system permissions so important in Linux DAC model? How do they relate or map to the concept of “subject-action-object” transactions?

12.7 Consider an automated audit log analysis tool (e.g., swatch). Can you propose some rules which could be used to distinguish “suspicious activities” from normal user behavior on a system for some organization?


Chapter 13


Review questions:

13.1 Define cloud computing.

13.4 Describe some of the main cloud-specific security threats.

13.7 List and briefly define the principal components of an IoT-enabled thing.


Chapter 20


Review questions:


20.2 What are the basic functions (operations) used in symmetric encryption algorithms?

20.4 What is the difference between a block cipher and a stream cipher?

20.10 List ways in which secret keys can be distributed to two communicating parties.




20.2 Consider a Feistel cipher composed of 16 rounds with block length 128 bits and key length 128 bits. Suppose for a given k, the key scheduling algorithm determines values for the first 8 round keys, k1, k2,… k8, then sets


k9=k8, k10=k7, k11=k6,…, k16=k1


Suppose you have a ciphertext c. Explain how, with access to an encryption oracle, you can decrypt c and determine m using just a single oracle query. This shows that such a cipher is vulnerable to a chosen plaintext attack. (An encryption oracle can be thought of as a device that, when given a plaintext, returns the corresponding ciphertext. The internal details of the device are not known to you and you cannot break open the device. You can only gain information from the oracle by making queries to it and observing its responses.)


20.7 Suppose an error occurs in a block of ciphertext on transmission using CBC. What effect is produced on the recovered plaintext blocks?


Chapter 21


Review Questions


21.4 What is a one-way function?

21.5 Briefly explain Diffie-Hellman key exchange.



21.8 In an RSA system, the public key of a given user is e=31, n=3599. What is the private key of this user?


Chapter 22


Review questions:


22.1 List four functions supported by S/MIME.

22.5 What protocols comprise SSL?

22.9 What services are provided by IPsec?




22.1 In SSL and TLS, why is there a separate Change Cipher Spec Protocol rather than including a change_cipher_spec message in the Handshake Protocol?


3. Article review: (20 points)




This is an INDIVIDUAL assignment. Answer the questions using a word processor. Make sure that you use a spelling checker. Cite all references used including the textbook. This includes any information that you get from the Internet. DO NOT FORGET to enclose any direct quotations in quotation marks.


General Description:


Please read the following paper on Android malware detection and write a summary about the paper. Show your critical analysis whenever you can.


Rana, M. S., Rahman, S. S. M. M., & Sung, A. H. (2018, September). Evaluation of tree based machine learning classifiers for android malware detection. In International Conference on Computational Collective Intelligence (pp. 377-385). Springer, Cham.


A copy of the paper is attached to this assignment.



Learning Objectives


The purpose of this assignment is to describe and summarize the content and fundamental argument of an article in a concise format, and through this exercise to practice skills in critical reading.



Deliverable Format:


The assignment must include 2-3 pages (single-spaced, not counting quotations used) containing:

· A paragraph showing the summary of the article

· Your opinion of the article’s quality and your own position. Did the writer do sufficient research? Is the article technically correct? Are there elements of the argument that could have been enhanced with more detail or more argumentation? What would a follow-up article contain to be useful to this one? Did you agree with the article? Did it support or change your opinion? If not, then why?

· Use the APA style for references and citations.


Evaluation Criteria


Your submission will be evaluated based on the following criteria.


· Quality of the article you choose

· Relevance to the course

· Technical depth of your discussion

· Soundness and originality of your critical evaluation

· Clarify of your discussion

· Conformance to APA on all citations and references


To expand the discussion, you are highly encouraged to explore additional relevant publications using the following search engines. If you do so, please include a “List of References” at the end of the summary.


Search Engines for Scholarly Publications




Google Scholar


Reference information on the APA style


Purdue University:

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Writers Hero only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Writers Hero are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Writers Hero is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Writers Hero, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.