SlideShare a Scribd company logo
1 of 2
Task 1:
In this module, you learned that random numbers (or, at least,
pseudorandom numbers) are essential in cryptography, but it is
extremely difficult even for powerful hardware and software to
generate them. Go online and conduct research on random
number generators. What are the different uses of these tools
besides cryptography? How do they work? Explain your answer
using your own words in 2-3 paragraphs.
Task 2:
Do the following review questions:
11.1 List and briefly define three classes of intruders.
11.2 What are two common techniques used to protect a
password file?
11.3 What are three benefits that can be provided by an
intrusion detection system?
11.4 What is the difference between statistical anomaly
detection and rule-based intrusion detection?
11.5 What metrics are useful for profile-based intrusion
detection?
11.6 What is the difference between rule-based anomaly
detection and rule-based penetration identification?
11.7 What is a honeypot?
11.8 What is a salt in the context of UNIX password
management?
11.9 List and briefly define four techniques used to avoid
guessable passwords.
Submit a Microsoft Word document

More Related Content

Similar to Task 1In this module, you learned that random numbers (or, .docx

Task 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docxTask 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docxjosies1
 
1. In your own words explain what happens when a session is hijack.docx
1. In your own words explain what happens when a session is hijack.docx1. In your own words explain what happens when a session is hijack.docx
1. In your own words explain what happens when a session is hijack.docxjackiewalcutt
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....Research Publish Journals (Publisher)
 
Evaluation of Snort using Rules for DARPA 1999 Dataset
Evaluation of Snort using Rules for DARPA 1999 DatasetEvaluation of Snort using Rules for DARPA 1999 Dataset
Evaluation of Snort using Rules for DARPA 1999 DatasetIJCSIS Research Publications
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksDamaineFranklinMScBE
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented ProgrammingPatricia Viljoen
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxspoonerneddy
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...amiable_indian
 
Chapter 91- How does the source of your software code affect.docx
Chapter 91- How does the source of your software code affect.docxChapter 91- How does the source of your software code affect.docx
Chapter 91- How does the source of your software code affect.docxtiffanyd4
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244Tom King
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxjustine1simpson78276
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemAlexander Decker
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy AssignmentTara Hardin
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...ShivamSharma909
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +infosec train
 

Similar to Task 1In this module, you learned that random numbers (or, .docx (20)

1435488539 221998
1435488539 2219981435488539 221998
1435488539 221998
 
Task 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docxTask 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docx
 
1. In your own words explain what happens when a session is hijack.docx
1. In your own words explain what happens when a session is hijack.docx1. In your own words explain what happens when a session is hijack.docx
1. In your own words explain what happens when a session is hijack.docx
 
Cis 552 final exam solution
Cis 552 final exam solutionCis 552 final exam solution
Cis 552 final exam solution
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
Evaluation of Snort using Rules for DARPA 1999 Dataset
Evaluation of Snort using Rules for DARPA 1999 DatasetEvaluation of Snort using Rules for DARPA 1999 Dataset
Evaluation of Snort using Rules for DARPA 1999 Dataset
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Chapter 91- How does the source of your software code affect.docx
Chapter 91- How does the source of your software code affect.docxChapter 91- How does the source of your software code affect.docx
Chapter 91- How does the source of your software code affect.docx
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy Assignment
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
 

More from josies1

Task Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxTask Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxjosies1
 
Task observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxTask observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxjosies1
 
Task Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxTask Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxjosies1
 
Task Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docxTask Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docxjosies1
 
Task Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxTask Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxjosies1
 
Task Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxTask Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxjosies1
 
Task Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxTask Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxjosies1
 
Task 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxTask 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxjosies1
 
Task Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxTask Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxjosies1
 
Task Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxTask Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxjosies1
 
Task Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxTask Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxjosies1
 
Task Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxTask Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxjosies1
 
Task descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxTask descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxjosies1
 
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxTask 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxjosies1
 
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxTask A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxjosies1
 
Task A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxTask A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxjosies1
 
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxTask 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxjosies1
 
Task 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxTask 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxjosies1
 
TASK 2 Describe your nutrition education teaching sessio.docx
TASK 2  Describe your nutrition education teaching sessio.docxTASK 2  Describe your nutrition education teaching sessio.docx
TASK 2 Describe your nutrition education teaching sessio.docxjosies1
 
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxTask 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxjosies1
 

More from josies1 (20)

Task Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxTask Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docx
 
Task observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxTask observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docx
 
Task Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxTask Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docx
 
Task Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docxTask Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docx
 
Task Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxTask Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docx
 
Task Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxTask Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docx
 
Task Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxTask Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docx
 
Task 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxTask 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docx
 
Task Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxTask Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docx
 
Task Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxTask Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docx
 
Task Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxTask Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docx
 
Task Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxTask Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docx
 
Task descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxTask descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docx
 
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxTask 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
 
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxTask A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
 
Task A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxTask A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docx
 
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxTask 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
 
Task 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxTask 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docx
 
TASK 2 Describe your nutrition education teaching sessio.docx
TASK 2  Describe your nutrition education teaching sessio.docxTASK 2  Describe your nutrition education teaching sessio.docx
TASK 2 Describe your nutrition education teaching sessio.docx
 
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxTask 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
 

Recently uploaded

How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 

Recently uploaded (20)

How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 

Task 1In this module, you learned that random numbers (or, .docx

  • 1. Task 1: In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs. Task 2: Do the following review questions: 11.1 List and briefly define three classes of intruders. 11.2 What are two common techniques used to protect a password file? 11.3 What are three benefits that can be provided by an intrusion detection system? 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection? 11.5 What metrics are useful for profile-based intrusion detection? 11.6 What is the difference between rule-based anomaly
  • 2. detection and rule-based penetration identification? 11.7 What is a honeypot? 11.8 What is a salt in the context of UNIX password management? 11.9 List and briefly define four techniques used to avoid guessable passwords. Submit a Microsoft Word document