Professional Documents
Culture Documents
Automata Theory Assignement
Automata Theory Assignement
14/02/2023
2
a.) Setting the password lifetime at 180 days would increase the risk of an
attacker successfully guessing a password and having access to the account for
a longer period of time. While longer password lifetimes can be more
convenient for users and reduce the frequency of password changes, they also
increase the window of opportunity for attackers to access sensitive
information. By limiting the password lifetime to 90 days, the system
administrators are balancing the need for security with the need for usability.
b.) i. Yes, I agree that without integrity, no system can provide confidentiality.
Confidentiality means that information is kept private and not disclosed to
unauthorized parties. However, if the information has been tampered with or
modified without authorization, it cannot be considered confidential anymore.
Integrity, on the other hand, ensures that information remains unaltered and
accurate, which is crucial for maintaining confidentiality. If there is no
integrity in a system, then there is no guarantee that the information being
kept confidential has not been modified, copied or stolen, and hence
confidentiality cannot be ensured.
c.) Requiring employees to report any contact with employees of the company's
competitors, even if it is purely social, may not have the desired effect of
stopping competitors from learning proprietary information. This policy could
create a culture of fear and mistrust among employees and discourage social
interaction, potentially harming morale and productivity. Moreover,
3
d.) Sharing a computer between the police and the public defender presents
significant security problems, as both agencies have access to sensitive and
confidential information that should be kept separate. There is a risk of
unauthorized access, data breaches, and potential conflicts of interest.
Sharing the same computer or set of computers between public agencies may be
a cost-saving measure, but it can compromise security and confidentiality. It is
recommended to have separate and secure computer systems for each agency to
minimize the risks of security breaches and protect sensitive information.
f.) Report the incident to the university's IT department and/or security team
immediately, as this is a serious breach of privacy and security.
Inform your friend that what they did was unethical and illegal, and advise
them to cooperate fully with any investigations.
4
If requested, provide any information you have about the incident to the
university's IT or security team, but do not make any accusations without
evidence.
Reference
Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will
transform how we live, work, and think. Houghton Mifflin Harcourt.