1 you have been hired by a bank to help them harden their

Assignment Help Computer Engineering
Reference no: EM13374499

1. You have been hired by a bank to help them harden their online banking service against phishing attacks. Explain briefly the strengths and weaknesses of the following four possible countermeasures:

(a) SSL/TLS client certificates issued to each customer.
(b) A handheld password calculator issued to each customer.
(c) Displaying a unique picture to each customer during the login process.
(d) Requiring that large payments, or payments to new recipients, be authorised by telephone or SMS as well as online.

In answering those questions you may need to explain how those countermeasures would be used.

2. Answer the following questions in the context of a food-court.
(a) List the objects present.
(b) List the groups of subjects present and show how they are related.
(c) State the actions available.
(d) Give a reasonable description of the access control for this system.
(e) Describe a specific human characteristic that might be considered a vulnerability in this system. This question should answer first.

i. Explain how that characteristic may be exploited by an attacker for some specified reason.

ii. Explain how that characteristic may lead to accidental damage.

3. Consider that I have an asset worth $1000. There are two independent threats. The first occurs with probability 0.10 and would reduce the value of the asset to $200, while the second occurs with probability 0.02 and would completely destroy the asset. Both could occur.

What would be the threshold value at which buying insurance would be "worthwhile for both parties"? Be sure to show working.

4. For the following information, draw up an ALE table and make a recommendation on the basis of it: Let Ei; 1 <= i <= 10 be the events that could cause damage. Let the respective frequency of events be {1.6,4,0.3,2,140, 0.04, 0.5,1, 0.001, 2}, and the respective cost per events be{3,6,30,3 ,0.3,600,37,45,1500,0.2}.

5. Consider that number of people N willing to buy cars at a given price P varies according to the function. N = 5000 - 2P

Note that, for example, a person willing to buy a car at a price of $200 will also be willing to buy a car at $100 and will be included under both. This is not a function of the number of persons with the price returned as the most they will pay.

(a) Provide a graph of N vs P, in an appropriate range, with N on the x axis and P on the y axis. Be sure to appropriately label the intercepts.

(b) Assume we have a competitive marketplace with a total of 200 cars for sale. How much money will be spent on purchasing cars? Justify your answer.

(c) Now assume we instead have a monopoly. You still have 200 cars for sale. You are only allowed to sell cars at four different prices and you must sell fifty cars at each price. What is the most you can make from car sales? Justify your answer.

6. What purpose might fault injection serve in the context of bicycle assembly? Describe how you might use it in such a setting.

7. Consider you have a fingerprint database containing the fingerprints of every person living in Singapore. To simplify the calculations we will assume there are 5,500,000 people in Singapore. Suppose the false acceptance rate, or false match rate is 1/1000.

(a) How many false matches will occur when 10,000 suspicious fingerprints are compared with the entire database? Justify your answer.

(b) For any individual suspect fingerprint, what is the chance of at least one false match? Justify your answer.

8. Give two distinct examples of the role trust plays in security engineering. Refer to the components of Anderson's framework in your answer.

9. Describe how top-down and bottom-up methods of threat/fault analysis can be used in identifying assets relevant to a scenario. You do not need to be exhaustive but do enough of the analysis to demonstrate you understand the processes. You can choose an appropriate scenario that wasn't looked at in the lectures or tutorials.

10. Complete the following ALE table. Explain what each row/column represents, and indicate units for entries. Explain what actions this specific table suggests we should take.

A 20,000 0.01 answer
B 18,000 0.5 answer
C 3, 000 answer 1,000
D 550 answer 1,100

E 25 4 answer
F 10 answer answer

11. For the scenario Sending a paper letter, describe which of the following properties would be appropriate. Justify your answers and give examples as appropriate Confidentiality, Integrity, Availability, Authenticity,

Anonymity, Non--repudiability, Accountability, Freshness.

Reference no: EM13374499

Questions Cloud

University values diversity what do you think that means : university values diversity. what do you think that means? what kind of diversity does a university want? why do you
Mining information from sales data is a common task in both : mining information from sales data is a common task in both traditional and online stores. past sales information can
1 baco opens its business in 20x2 and purchases merchandise : 1. baco opens its business in 20x2 and purchases merchandise on account for 88000. in 20x2 baco pays 67000 cash on the
Part-1researchers culture is very well present in the : part-1researchers culture is very well present in the social constructivism approach. according to dowling schuler and
1 you have been hired by a bank to help them harden their : 1. you have been hired by a bank to help them harden their online banking service against phishing attacks. explain
Create an integral whereby you are forced to use all four : create an integral whereby you are forced to use all four types of integration. work the problem and explain why each
1custom decision support system for an international : 1.custom decision support system for an international airlinea major international airline of your choice wants to
Taking what you have come to understand about chaucers : taking what you have come to understand about chaucers ironic sarcastic style ofwriting you now have the opportunity to
1 discuss the stages in the negotiation process and how : 1. discuss the stages in the negotiation process and how culturally based value systems influence these stages.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd