Order This Assignment At Speedywriters.us Trusted by 2000+ happy customers speedywriters reviews

Note: There is no minimum or maximum page length for your answer sheet. Answer questions with well thought out answers, explain your answer, and show your work. Answers, even if right but without an explanation (Also- must include references for each problem-APA Style), will get no credit. Test is open book/notes/internet, but individual, NOT TO BE SHARED.  There is no limitation in terms of space for each answer as the content is more important than the quantity. Save the file as a word file, and post it in the Grade Book before the deadline. Do keep the questions/instructions in this word file with your answers.

Answer the following questions.
1)(10 pts.) Chapter 18 (pgs. 494-495) –Problem#4

Requirements are often difficult to derive, especially when the environments in which the system will function, and the specific tasks it will perform, are unknown. Explain the problems that this causes during development of assurance.

2) (10 pts.) Chapter 18 (pgs. 494-495) –Problem#5

 Why is the waterfall model of software engineering the most commonly used method for development of trusted systems?

3) (10 pts.) Chapter 20 (pg. 569) –Problem#3

Why does the Boyer-Moore theorem prover perform induction only when the other five steps fail to simplify the formula? Why does it not try induction first?

4) (10 pts.) Chapter 21 (pgs. 609-610) –Problem#4

What are the conceptual differences between a reference validation mechanism, a trusted computing base, and the TOE Security Functions?

5) (10 pts.) Chapter 21 (pgs. 609-610) –Problem#6

Identify the specific requirements in the Common Criteria that describe a reference validation mechanism. Hint: Look in both security functional classes and security assurance classes.

6) (10 pts.) Chapter 23 (pgs. 685-687) –Problem#5

Can the UNIX Bourne shell variable HOME, which identifies the home directory of a user to programs that read start-up files from the user’s home directory, be used to compromise a system? If so, how?

7) (10 pts.) Chapter 23 (pgs. 685-687) –Problem#11

The NRL classification scheme has three axes: genesis, time of introduction, and location. Name two other axes that would be of interest to an analyst. Justify your answer.

8) (10 pts.) Chapter 23 (pgs. 685-687) –Problem#12

In the NRL classification scheme for the “time of introduction” axis, must the development phase precede the maintenance and operation phases, and must the maintenance phase precede the operation phase? Justify your answer.

9) (20 pts.) Essay Question: Type-1 certification (TOP SECRET) focuses on Development Methodology. How would you address this certification issue with your hypothetical company (make up one for this problem) for your system (for example: operating system) that you are trying to certify at the TOP SECRET level? This certification issue focuses on two areas: (a) Software Development Process and (b) Life Cycle Model. Hint: Remember; you are focusing on security as your top priority for this case and not necessarily performance. (All the external information (outside of your textbook) you need to answer this question is on the Internet (no other sources allowed) and you don’t need a security background on this subject. In addition, this subject has been addressed in a previous course in the INFA Curriculum (610)). This is a capstone question to get you thinking as a computer security system designer for information assurance.


1._________ (10 pts.)

2._________ (10 pts.)

3._________ (10 pts.)

4._________ (10 pts.)

5._________ (10 pts.)

6._________(10 pts.)

7._________(10 pts.)

8._________(10 pts.)

9._________(20 pts.)

MIDTERM GRADE = “           “

Click here to order this assignment @Speedywriters.us. 100% Original.Written from scratch by professional writers.

Leave a Reply

Your email address will not be published.