0% found this document useful (0 votes)
15 views3 pages

Activity Unit 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views3 pages

Activity Unit 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Sample example:

To design a security system based on the given requirements using propositional logic, we
can define the following propositions:

 M: The motion detector is triggered.


 W: A window is broken.
 D: The door is open.
 A: The alarm goes off.

Logical Expression

The alarm A will go off if either:

1. The motion detector is triggered (M), OR


2. A window is broken (W) AND the door is open (D).

This can be expressed logically as: =M∨(W∧D)

Explanation:

 M∨(W∧D): The alarm will go off if the motion detector is triggered (M) or both the
window is broken (W) and the door is open (D) at the same time.

Truth Table

Let's create a truth table to validate this expression:

M (Motion Detector) W (Window) D (Door) W D A (Alarm) ∧


0 0 0 0 0
0 0 1 0 0
0 1 0 0 0
0 1 1 1 1
1 0 0 0 1
1 0 1 0 1
1 1 0 0 1
1 1 1 1 1

Interpretation:

 When M=1 (the motion detector is triggered), the alarm A will always be 1 (on)
regardless of the states of W and D.
 When M=0, the alarm will go off only if both W=1 (a window is broken) and D=1
(the door is open).

This logical design ensures that the alarm system functions as specified, providing security
coverage for both scenarios.
Example 1: Automated Email Filtering System

Scenario:
Design an automated email filtering system where an email is marked as spam if:

 The sender is not in the contacts list AND


 The subject contains suspicious keywords OR
 The email has an attachment but the sender is not verified.

Example 2: Cloud Storage Synchronization

Scenario:
Design a cloud storage synchronization system where a file is synchronized if:

 It has been modified AND


 It is not already synchronized OR
 The user has enabled automatic synchronization.

Example 3: Password Change Reminder System

Scenario:
Design a system that reminds a user to change their password if:

 The password has not been changed in the last 90 days OR


 The password was compromised in a data breach AND
 The user has not yet been notified.

Example 4: System Access Control

Scenario:
Design a system where access is granted only if:

 The user is authenticated AND


 The user is authorized to access the requested resource OR
 The system is in maintenance mode, in which case only administrators have access.

Example 5: Network Security Monitoring

Scenario:
Design a network security monitoring system that triggers an alert if:

 A firewall rule is violated IMPLIES


 There is an ongoing attack AND
 The intrusion detection system (IDS) has detected unusual activity.

Example 6: Data Backup and Restore System

Scenario:
Design a data backup system that restores files if:
 The files are found to be corrupted OR
 The last backup was not successful IF
 The user has not manually overridden the restore process.

Example 7: Login Authentication System

Scenario:
Design a login authentication system that allows access if:

 The correct username and password are entered AND


 The user is not on the blacklist OR
 The user is an admin.

Example 8: Software Update Notification System

Scenario:
Design a software update notification system where the user is notified if:

 A new update is available AND


 The current version is outdated OR
 The user has enabled automatic update checks.

Example 9: Disk Space Management System

Scenario:
Design a disk space management system that triggers a cleanup process if:

 The disk usage exceeds 90% AND


 The temporary files have not been cleaned in the last week OR
 The system has been idle for more than 1 hour.

You might also like