CSCI-UA.0480-11: Intro to Computer Security Homework 1

CSCI-UA.0480-11: Intro to Computer Security Spring 2019
Homework 1
via classes.nyu.edu1. Threat modeling: Imagine you’ve just been hired to produce a comprehensive threat model for
CitiBike , New York’s public bike share system. Describe three security policies, and for each of
them describe a technical mechanism to enforce those policies. Choose one policy each that
deals with a threat from thieves (financially motivated attackers), terrorists (attackers aiming to
cause violent disruption) and trolls (attackers trying to cause inconvenience or annoyance).
2. Hash functions : In class we discussed several desirable properties for hash functions, in
particular one-wayness and collision-resistance . In this exercise, we’ll show that neither property
北美代写,美国作业代写,网课代修,Assignment代写-100%原创 implies the other. We can do this by counter-example:

繼續閱讀“CSCI-UA.0480-11: Intro to Computer Security Homework 1”

EECS 281: Data Structures and Algorithms

EECS 281: Data Structures and Algorithms
Lab 10 Assignment
Q1 What kind of algorithms are Prim’s and Kruskal’s? (0.5 pts)
A. brute force
B. greedy
C. divide and conquer
D. branch and bound
E. none of the above 繼續閱讀“EECS 281: Data Structures and Algorithms”

Software Engineering 265 Software Development Methods Summer 2019 Assignment 1

Software Engineering 265 Assignment 1

Software Engineering 265
Software Development Methods
Summer 2019
Assignment 1
Due: Tuesday, June 11, 11:55 pm by submission via git
(no late submissions accepted) 繼續閱讀“Software Engineering 265 Software Development Methods Summer 2019 Assignment 1”