List and describe methods of using biometrics as authentication methods
Questions about Information Assurance. Write much as possible in your own words. No short answers1. The Chinese Wall model is a model of security policy. Explain Chinese model step by step with example. Also compare and write difference between Bell-LaPadula and Chinese Wall Model2. Explain clinical information systems step by step with example. Also compare and write difference between Bell-LaPadula and clinical information systems.3. Explain DES by step by step with detail description of each step.4. Explain transposition cipher and substitution cipher. Provide example for each cipher. Explain the difference between two ciphers (15 points) 5. What are session key and interchange key6. From classical cryptographic key exchange and authentication, Explain step by step for Denning/Sacco protocol and Otway-Rees protocol. What are the difference between two protocols7. What is n stage linear feedback shift register? Explain the procedure step by step.8. Explain self-healing property9. Explain two types of dictionary attack with example10. What is password aging? Explain with example11. List and describe methods of using biometrics as authentication methods12. Describe Encrypted key exchange protocol
