SlideShare a Scribd company logo
Task 1:
In this module, you learned that random numbers (or, at least,
pseudorandom numbers) are essential in cryptography, but it is
extremely difficult even for powerful hardware and software to
generate them. Go online and conduct research on random
number generators. What are the different uses of these tools
besides cryptography? How do they work? Explain your answer
using your own words in 2-3 paragraphs.
Task 2:
Do the following review questions:
11.1 List and briefly define three classes of intruders.
11.2 What are two common techniques used to protect a
password file?
11.3 What are three benefits that can be provided by an
intrusion detection system?
11.4 What is the difference between statistical anomaly
detection and rule-based intrusion detection?
11.5 What metrics are useful for profile-based intrusion
detection?
11.6 What is the difference between rule-based anomaly
detection and rule-based penetration identification?
11.7 What is a honeypot?
11.8 What is a salt in the context of UNIX password
management?
11.9 List and briefly define four techniques used to avoid
guessable passwords.
Submit a Microsoft Word document

More Related Content

Similar to Task 1In this module, you learned that random numbers (or, .docx

Task 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docxTask 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docx
josies1
 
1. In your own words explain what happens when a session is hijack.docx
1. In your own words explain what happens when a session is hijack.docx1. In your own words explain what happens when a session is hijack.docx
1. In your own words explain what happens when a session is hijack.docx
jackiewalcutt
 
Cis 552 final exam solution
Cis 552 final exam solutionCis 552 final exam solution
Cis 552 final exam solution
Homework Help Online
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
WilheminaRossi174
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
Research Publish Journals (Publisher)
 
Evaluation of Snort using Rules for DARPA 1999 Dataset
Evaluation of Snort using Rules for DARPA 1999 DatasetEvaluation of Snort using Rules for DARPA 1999 Dataset
Evaluation of Snort using Rules for DARPA 1999 Dataset
IJCSIS Research Publications
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
DamaineFranklinMScBE
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
Lexume1
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
Patricia Viljoen
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
spoonerneddy
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
amiable_indian
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
AlexisHarvey8
 
Chapter 91- How does the source of your software code affect.docx
Chapter 91- How does the source of your software code affect.docxChapter 91- How does the source of your software code affect.docx
Chapter 91- How does the source of your software code affect.docx
tiffanyd4
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244Tom King
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
justine1simpson78276
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
Alexander Decker
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy Assignment
Tara Hardin
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
ShivamSharma909
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
infosec train
 

Similar to Task 1In this module, you learned that random numbers (or, .docx (20)

1435488539 221998
1435488539 2219981435488539 221998
1435488539 221998
 
Task 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docxTask 1 Some common biometric techniques includeFingerp.docx
Task 1 Some common biometric techniques includeFingerp.docx
 
1. In your own words explain what happens when a session is hijack.docx
1. In your own words explain what happens when a session is hijack.docx1. In your own words explain what happens when a session is hijack.docx
1. In your own words explain what happens when a session is hijack.docx
 
Cis 552 final exam solution
Cis 552 final exam solutionCis 552 final exam solution
Cis 552 final exam solution
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
Malware analysis and detection using reverse Engineering, Available at: www....
Malware analysis and detection using reverse Engineering,  Available at: www....Malware analysis and detection using reverse Engineering,  Available at: www....
Malware analysis and detection using reverse Engineering, Available at: www....
 
Evaluation of Snort using Rules for DARPA 1999 Dataset
Evaluation of Snort using Rules for DARPA 1999 DatasetEvaluation of Snort using Rules for DARPA 1999 Dataset
Evaluation of Snort using Rules for DARPA 1999 Dataset
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Chapter 91- How does the source of your software code affect.docx
Chapter 91- How does the source of your software code affect.docxChapter 91- How does the source of your software code affect.docx
Chapter 91- How does the source of your software code affect.docx
 
packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244packet-sniffing-switched-environment-244
packet-sniffing-switched-environment-244
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
 
Application of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection systemApplication of genetic algorithm in intrusion detection system
Application of genetic algorithm in intrusion detection system
 
Bro Policy Assignment
Bro Policy AssignmentBro Policy Assignment
Bro Policy Assignment
 
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
Top Interview Questions to Master as a CompTIA Security+ Certified Profession...
 
Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +Top Interview Questions for CompTIA Security +
Top Interview Questions for CompTIA Security +
 

More from josies1

Task Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxTask Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docx
josies1
 
Task observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxTask observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docx
josies1
 
Task Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxTask Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docx
josies1
 
Task Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docxTask Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docx
josies1
 
Task Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxTask Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docx
josies1
 
Task Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxTask Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docx
josies1
 
Task Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxTask Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docx
josies1
 
Task 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxTask 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docx
josies1
 
Task Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxTask Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docx
josies1
 
Task Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxTask Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docx
josies1
 
Task Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxTask Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docx
josies1
 
Task Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxTask Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docx
josies1
 
Task descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxTask descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docx
josies1
 
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxTask 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
josies1
 
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxTask A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
josies1
 
Task A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxTask A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docx
josies1
 
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxTask 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
josies1
 
Task 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxTask 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docx
josies1
 
TASK 2 Describe your nutrition education teaching sessio.docx
TASK 2  Describe your nutrition education teaching sessio.docxTASK 2  Describe your nutrition education teaching sessio.docx
TASK 2 Describe your nutrition education teaching sessio.docx
josies1
 
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxTask 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
josies1
 

More from josies1 (20)

Task Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docxTask Strict APA format - 250 words.Why is it important for busi.docx
Task Strict APA format - 250 words.Why is it important for busi.docx
 
Task observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docxTask observe nonverbal communication between two or more individual.docx
Task observe nonverbal communication between two or more individual.docx
 
Task Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docxTask Research Sophos (Intrusion Detection System) and consider .docx
Task Research Sophos (Intrusion Detection System) and consider .docx
 
Task Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docxTask Mode Task Name DurationStart Time Finish1Set .docx
Task Mode Task Name DurationStart Time Finish1Set .docx
 
Task Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docxTask Name Phase 4 Individual Project Deliverable Length General.docx
Task Name Phase 4 Individual Project Deliverable Length General.docx
 
Task Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docxTask Identify 3 articles which relate to information security and pr.docx
Task Identify 3 articles which relate to information security and pr.docx
 
Task Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docxTask Develop a posteron a specific ethics topic and a writt.docx
Task Develop a posteron a specific ethics topic and a writt.docx
 
Task 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docxTask 6 reading material · Module 4 Leading Across the Inciden.docx
Task 6 reading material · Module 4 Leading Across the Inciden.docx
 
Task Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docxTask Groups in the School SettingPromoting Children’s Socia.docx
Task Groups in the School SettingPromoting Children’s Socia.docx
 
Task Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docxTask Case Description· An individual task. It consists of .docx
Task Case Description· An individual task. It consists of .docx
 
Task Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docxTask Identify 3 articles which relate to information security an.docx
Task Identify 3 articles which relate to information security an.docx
 
Task Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docxTask Details What do we know about COVID-19 risk factors What h.docx
Task Details What do we know about COVID-19 risk factors What h.docx
 
Task descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docxTask descriptionA list with information about movies needs to .docx
Task descriptionA list with information about movies needs to .docx
 
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docxTask 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
Task 4 Cenere, Gill, Lawson, and Lewis (2015) state that Everyth.docx
 
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docxTask A. [20 marks] Data Choice. Name the chosen data set(s) .docx
Task A. [20 marks] Data Choice. Name the chosen data set(s) .docx
 
Task A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docxTask A Restaurant have an interested in creating a new grading s.docx
Task A Restaurant have an interested in creating a new grading s.docx
 
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docxTask 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
Task 3 - Week Three Discussion - TCPIP Transport Layer Features.docx
 
Task 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docxTask 1 Which groups are you going to deal withWhen thinking.docx
Task 1 Which groups are you going to deal withWhen thinking.docx
 
TASK 2 Describe your nutrition education teaching sessio.docx
TASK 2  Describe your nutrition education teaching sessio.docxTASK 2  Describe your nutrition education teaching sessio.docx
TASK 2 Describe your nutrition education teaching sessio.docx
 
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docxTask 1 Kirk (2016) states that the topic of color can be a mine.docx
Task 1 Kirk (2016) states that the topic of color can be a mine.docx
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 

Task 1In this module, you learned that random numbers (or, .docx

  • 1. Task 1: In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs. Task 2: Do the following review questions: 11.1 List and briefly define three classes of intruders. 11.2 What are two common techniques used to protect a password file? 11.3 What are three benefits that can be provided by an intrusion detection system? 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection? 11.5 What metrics are useful for profile-based intrusion detection? 11.6 What is the difference between rule-based anomaly
  • 2. detection and rule-based penetration identification? 11.7 What is a honeypot? 11.8 What is a salt in the context of UNIX password management? 11.9 List and briefly define four techniques used to avoid guessable passwords. Submit a Microsoft Word document