Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Consider the following enforcement mechanisms. State a policy that the mechanism

ID: 3746183 • Letter: C

Question

Consider the following enforcement mechanisms. State a policy that the mechanism might be helping to enforce: (a) A password changing program will reject passwords that are less than five characters long or that are found in the dictionary. Mechanisms: Policy: (b) The login program will disallow logins of any students who enter their passwords incorrectly three times. (c) The permissions of the file containing Carol's homework will prevent Robert from cheating and copying it. (d) when web traffic climbs to more than 80% of the network's capacity, systems disallow any further communications to or from Web servers. (e) Annie, a systems analyst, will be able to detect a student using a program to scan her system for vulnerabilities (f) A program used to submit homework will turn itself off just after the due date.

Explanation / Answer

a) A password-changing program will reject passwords that are less than five characters long or that are found in the dictionary

Mechanism :The mechanism is the Authentication in which the program that checks for the passwords less than 5 characters and rejects them .

Policy: The policy used here is that easily guesses passwords are not allowed

b) The login program will disallow logins of any students who enter their passwords incorrectly three times

Mechanism : The mechanism used here is that after failing three times to login into an account , the account is disabled

Policy : The policy here is that only authorized students are allowed to login.

c)  The permissions of the file containing Carol’s homework will prevent Robert from cheating and copying it.

Mechanism :The mechanism used here is authentication , The read access is restricted by the file protection mechanism.

Policy : The policy used here is the Confidentiality that  no student can read another student’s homework

d) When World Wide Web traffic climbs to more than 80% of the network’s capacity, systems will disallow any further communications to or from Web servers.

Mechanism :The mechanism used here is to response and block the traffic when the traffic is more than 80% of the network’s capacity in WWW.

Policy : The policy used here is to monitor the World Wide Web to not interfere with other network traffic

e) Annie, a systems analyst, will be able to detect a student using a program to scan her system for vulnerabilities.

Mechanism : The mechanis used here is that which is used by Annie to detect the scanning

Policy : The policy used here is to monitor that systems may not be scanned for vulnerabilities by students.

f) A program used to submit homework will turn itself off just after the due date.

Mechanism :The Mechanism used is that the program is disabled after its due date

Policy : The policy used here is that late homework submitted is not accepted