IMPLEMENTATION
Assignment 1
Name: Bhargavi Bussu
Student Id: 10000126759
Professor: Paul Wang
1.3 Traditionally a user's view of a Computer system like an Onion. Explain why this concept is outdated and draw a new diagram based on the concept proposed in this book.
In Today's current generation the Computer systems are wide opened to the Internet, however threat towards the Computer system have been increasing rapidly at a faster rate.
Despite of increasing counter attacks on Computer systems people have started developing invented and used different solving techniques to prevent from them such as Firewall, User authentication , Norton Antivirus so on ....
Even after putting lot of efforts to prevent the counter attacks on Computer systems still we are standing way back. Data bleach and Computer have to compromises are still remains very common and same. In older days for our Computer system counter attack techniques most of them used to detect based on passive techniques. We use to get alerts for Computer system once after attacks have taken place. In Robotics, Japanese scientist have been spent a Trillions of dollars to develop a new Robots to have a secured and privacy life for humans, However in our ancient days people had secured their life in person by their own for their secured and privacy life. …show more content…
This is the same as now the so called Secured human privacy life. If we apply same above technique for Computer systems we can conclude that we not only build the Norton for preventing counter attacks, in near feature we have to build the Computer systems in such a way that it has to detect the counter attack before they get affected. In the year 2005, a United States of America patent was filed to introduce new technology that can actually prevent the getting out information stored in the Computer system from the hackers. The technology has drawn the attention of entire United States of American government, world, industries and academics. Below is the diagram for conceptual diagram of secured computer system. In traditional to Computer system apart from Hardware and Software we added another additional layer so called Virtual semi conductor it allows the computer operator to access the data and control information. So that the hackers will not be able to find any route to steal the data or information from the Computer systems. CONCEPTUAL DIAGRAM OF SECURED COMPUTER SYSTEM 1.7 Draw a diagram of Neumann architecture and a Single-bus diagram of Neumann architecture. 1.11 Discover the NIC(s) on your computer? Is it wired or wireless? NIC: Network Interface Card (and also known as Network Interface Controller, by similar called network adapter, LAN adapter) in my computer is wireless not wired and also handles data communication. 1.18 Suppose Alice is an employee of a hospital called FX Hospital, and her job responsibility is to order medical equipment for the hospital from a company called GEE. GEE has a Web site that Alice to procure medical equipment for her hospital. Answer the following questions. 1. Alice has to log into GEE and give that Web site her username and password through SSL protocol so that GEE knows that it is Alice. This is called Authentication. Authorization, authentication, confidentiality, integrity 2. If Alice tries to