Unit 10 Flashcards
SAQ 1 - A
Alice alters Bob’s file without permission.
Which type of interference is taking place?
Modification
SAQ 1 - A
A hacker deploys software to observe packets travelling on a network.
Which type of interference is taking place?
Interception
SAQ 1 - A
A website receives a flood of requests for a web page, preventing callers from
viewing the site.
Which type of interference is taking place?
Interruption
SAQ 1 - A
A user receives an email appearing to be from his supervisor, who did not send
the email.
Which type of interference is taking place?
Fabrication
Exercise 1
Describe how each of the classes of security threat shown in Figure 1 may apply to
a file on a hard disk.
(a) Normal operation – no interference to file access. (Information/operation not
threatened. )
(b) Interruption – an attacker has prevented authorised access to the file.
(c) Interception – an unauthorised party has obtained access to the file.
(d) Modification – an unauthorised party has altered the file.
(c) Fabrication – a fake file has been constructed.
Exercise 2 - A
What security services might be at fault in a click-fraud case in which fake clicks
are generated on an online advertisement?
Non-repudiation may be at fault if the clicks cannot be associated with particular
parties. It is likely that the clicks cannot be easily traced, because the most
likely form of identification in this case is an IP address, and IP addresses can be
fabricated by a program.
Exercise 2 - B
What class of threat is this an example of?
The class of threat is fabrication. (Fabrication prevention is a reason for some
websites setting ‘puzzles’ that need to be solved before a certain action can be
carried out – completion of such tasks requires human involvement.)
Exercise 3
The Music Store sells instruments and accessories (reeds, strings, sheet music etc.).
Customers have unique account numbers. Some customers pay with cash and some
on credit. Goods that are ordered on credit are sent with an invoice to the customer
and payment is required later. Not all customers have credit accounts, and those that
do have a spending limit. What security issues are involved for The Music Store’s
online purchasing system?
The main issues are the following.
- Authentication is needed to establish customer identity.
- Authorisation is needed for credit purchases and for their amount, also to ensure
that callers can only perform functions that they are authorised to execute and
access resources that they are allowed to access.
- There must be a way of proving that a customer made an order (non-repudiation for
buyer and seller).
- Confidentiality of customer information must be maintained.
- The integrity of the order must be maintained; for example, the values on the invoice
data must not change.
- Availability of The Music Store system is important for business!
SAQ 4
Why is public key cryptography called asymmetric and private key cryptography called
symmetric?
In public key cryptography there are two different keys, the public key and private key,
one used for encryption and the other for decryption. In private key cryptography there
is one key, the secret key suitable for both encryption and decryption
Exercise 9
Give an example of a middle-person attack on public key cryptography.
Alice wants to send a message to Bob, using Bob’s public key. Alice is tricked into using
Eve’s (the middle person’s) public key instead. Now Eve is able to impersonate Bob and
read messages intended for Bob. (Bob will not be able to decipher these messages,
even if he receives them.)
SAQ 5 - A
What class of cipher might you be likely to use in the following circumstance?
Storing passwords in a local file
Hash
SAQ 5 - B
What class of cipher might you be likely to use in the following circumstance?
Proving you sent an email
Public key and hash (for signing)
SAQ 5 - C
What class of cipher might you be likely to use in the following circumstance?
Using a wireless connection on your laptop
Stream
SAQ 5 - D
What class of cipher might you be likely to use in the following circumstance?
Encrypting files on a file system
Block cipher
SAQ 6
What is a secure channel?
A secure channel is a communication channel between a pair of processes that can
authenticate each other and provides confidentiality and integrity services, including
time stamping.