Open design would seem to favor the attacker, because it certainly opens the implementation and perhaps also the design for the attacker to study. Justify that open design overrides this seeming advantage and actually leads to solid security.
What will be an ideal response?
Open design allows for much closer inspection of the security system—more awareness of the security practices in place is more likely to reveal vulnerabilities to enable resolving those vulnerabilities rather than their exploitation. Obscurity is an insufficient security mechanism, open design allows a more thorough inspection, and knowing that a design will be open should make designers more careful.
You might also like to view...
TCP is a robust protocol: sequencing and error correction are assured, but there is a penalty in overhead (e.g., if no resequencing or error correction is needed). UDP does not provide these services but is correspondingly simpler. Cite specific situations in which the lightweight UDP protocol could be acceptable, that is, when error correction or sequencing is not needed.
What will be an ideal response?
The table below displays enrollment figures for several programs at a local community college. One student is selected at random from one of these programs and receives a gift card to the student bookstore. Use the information in this table for the problem. Major Male Female Total Criminal Justice44 28 72 Early Childhood 4 49 53 Automotive32 2 34 Culinary28 16 44 Total 108 95 203 Find the probability that the student selected is male.
A.
B.
C.
D.
E.