The “Method-Opportunity-Motive”
Study Guide help. Explain the “Method-Opportunity-Motive” analysis of malicious attackers to computer systems. Discuss the three bases of authentication.
3. Set up a simple scheme that uses authentication based upon things that the user knows to allow them to access their bank account online.
4. What are the advantages and disadvantages of requiring a user to employ at least one symbol (e.g., ! or %) in their passcode?
5. Explain the advantages and disadvantages of using biometrics for user authentication.
6. Discuss the meaning and purposes of cryptography.
7. What is the role of algorithms in cryptography?
8. What is a buffer overflow and what dangers are presented by them?
9. What are the differences among viruses, Trojan horses, and worms?
10. Detail at least one effective malware countermeasure.
11 Explain the role of a browser.
12. What is the role and purpose of a website integrity checksum?
13. Why do legitimate companies send out spam?
14. What is phishing? Why is this dangerous to users?
15. Explain at least two security features usually found in ordinary operating systems.

