22908 CSC 3080A - 0 - Operating Systems

Spring 2012
Herbert J. Bernstein ( )

Quiz 8


This web page is http://www.bernstein-plus-sons.com/.dowling/CSC3080S12/CSC3080_Quiz_8.html
Copyright © 2003, 2005, 2012 Herbert J. Bernstein and other parties. All rights reserved.

This is the eighth weekly quiz to be taken by Friday, 30 March 2012. It should take you between half an hour and 2 hours to answer the following questions. You should take this quiz after reading Chapter 5, 6 and 7 in Anderson.

  <==== Do this AFTER you've answered all the questions

You probably DON'T want to do this ===>  

Please fill in the following information:



Skype ID:

  1. The text claims that "a security engineer needs to be familiar with cryptology". Write a coherent, well researched full 5 paragraph essay discussing this point.

  2. Explain monoalphabetic substitution and give an example showing both encryption and description, and explain how to crack this code.

  3. Explain the Playfair cipher.

  4. Explain in detail the role of the birthday theorem in cyber security.

  5. What is elliptic curve cryptography?

  6. Explain TOCTTOU attacks.

  7. Discuss ACID transactions.

  8. Explain the relationship of accurate time to cyber security.

  9. Explain the Byzantine fault model.

  10. Explain the problems that arise from trying to make a name do too much.

  11. Explain the value of lock-in.

  12. Explain the Prisoner's Dilemma.

  13. Explain why Windows is so insecure.

  14. Give a status report on your project. If multiple people are involved, each person needs to report.

  <==== Do this AFTER you've answered all the questions

You probably DON'T want to do this ===>  

Revised 29 March 2012