CSCI-UA.0480-11: Intro to Computer Security Homework 1

CSCI-UA.0480-11: Intro to Computer Security Spring 2019
Homework 1
via classes.nyu.edu1. Threat modeling: Imagine you’ve just been hired to produce a comprehensive threat model for
CitiBike , New York’s public bike share system. Describe three security policies, and for each of
them describe a technical mechanism to enforce those policies. Choose one policy each that
deals with a threat from thieves (financially motivated attackers), terrorists (attackers aiming to
cause violent disruption) and trolls (attackers trying to cause inconvenience or annoyance).
2. Hash functions : In class we discussed several desirable properties for hash functions, in
particular one-wayness and collision-resistance . In this exercise, we’ll show that neither property
implies the other. We can do this by counter-example:

繼續閱讀“CSCI-UA.0480-11: Intro to Computer Security Homework 1”

EECS 281: Data Structures and Algorithms

EECS 281: Data Structures and Algorithms
Lab 10 Assignment
Q1 What kind of algorithms are Prim’s and Kruskal’s? (0.5 pts)
A. brute force
B. greedy
C. divide and conquer
D. branch and bound
E. none of the above 繼續閱讀“EECS 281: Data Structures and Algorithms”

CSC B07 Software Design Assignment | Individual

CSC B07 Software Design
Assignment | Individual
Overview
For this Assignment, you will implement a set of Java classes according to the UML diagrams provided in
this assignment description.
Learning Outcomes
By the end of this assignment, you should have:

繼續閱讀“CSC B07 Software Design Assignment | Individual”