CIS4017 System Administration and Security Assignment

Assignment Help Other Subject
Reference no: EM132485893

CIS4017 System Administration and Security - Teesside University

Assignment - Cryptography basics, security analysis, design and implementation

Part I Cryptography basics

RSA
Question 1. Assume a public key for RSA encryption given by the pair (143,11). Find the private key corresponding to this pair.

Question 2. Using the pair (143, 11), decode the encrypted message (111 4 88 57 116 67) assuming the letters were represented by ASCII values
(recall that the ASCII values are 65->A, 66->B, ... and 97->a, 98->b, ...)

Feige-Fiat-Shamir scheme

Question 3. Describe in detail the simplified Feige-Fiat-Shamir accreditation scheme between Peggy and Victor?

Question 4. Consider the simplified Feige-Fiat-Shamir scheme with parameters n=15 and r=11. Trace with these values the contents of all the messages that Peggy and Victor will send/receive.

Diffie-Hellman protocol

Question 5. Describe in detail the Diffie-Hellman protocol for three parties Alice, Bob and Carol.

Part II Security analysis and design

Scenario I - Security models

ABC Ltd. is a company providing security solutions to public services. You are asked to help the ABC Ltd to design a security model for the national defence department - a part of an e-government project on secure information control in managing troops. Assume the armed forces be classified as: {army, navy, air force, marines}, the security levels are typed as: {high, low}.

Your tasks: You should produce a short report (around 500 words) to formalise a Bell Lapadula model to address the confidentiality properties for the specified scenario, and to discuss the strength and weakness of your model.

Hint: You need to describe the model (specify subjects, objects, possible operations - which can be flexible, design your own but need to show your understanding of specifying and applying the BLP model in a real case), the security lattice (a graph can be helpful), the policy and the security properties for the given scenario above.

Scenario II - Security Analysis and Solutions to Conference Management Systems
A conference manage system is a web-based management system which allows researchers submit research papers, the program committee (PC) members (reviewers) to browse papers and contribute reviews, scores and discussion, and release decisions (such as rejection or accept) via the Web. In one arrangement, the conference chair downloads and hosts the appropriate server software.

The system allows users to submit papers, enter reviews & scores and access reviews & scores associated with events (conferences or workshops) regarding to the role of the uses. A user is granted access to the system by providing a role (chair, reviewer, or author) along with a user-id and associated password. Permissible roles for each user are specified at the time a new event is added to the management system. Reviews & scores on papers are initially assigned by chairs (chairs assign papers to reviewers for reviewing, one reviewers can be assigned multiple papers, one paper can be allocated to multiple reviewers). Reviewing are done by reviewers. And a chair can perform any and/or all of these actions, but a chair's updates can only be changed by the chair. An author, in addition to learning about his or her reviews & grades on individual papers, is entitled to learn the acceptance statistics (but not other papers' reviews), and the conference program.

Threat model: The adversary is a user who desires to learn the reviews & scores, changes reviews & scores, or prevent others from learning or changing reviews & scores. The adversary has access to the management system and also can read, delete, and/or update network messages in transit. The adversary cannot physically access or run programs on a user's machine that is running a browser to access the management system. And the adversary can not physically access or run programs on the server hosting the management system.

Your tasks: You are asked to produce a report (1500-2000words) to provide contemplate descriptions of the above Web-based Conference Management System and identify the following:

Question 1. Assets and security properties: what objects should be protected, what security properties might we expect the system to enforce? For each such security property, label it with one of: confidentiality, integrity, or availability?

Question 2. Vulnerability: explain the vulnerability in the system and use an attack tree/model to describe how an attack could be mounted. Restrict your consideration to the threat model provided.

Question 3. Protection: explain what cost-effective protections are available against the threats that you identify. Remember the focus is on software vulnerabilities.

Hint: Assuming that the manager is not a technical person, craft your explanation in a way that can be explained to a layman and include figures where necessary.

Scenario III- Design and Implementation of a Secure Server Network

This task involves designing and implementing an Internet-connected secure server network for a medium sized company named Smith Logistics, UK. They want to implement a secure network that uses Class C network address with two subnets in total - server subnet and one LAN subnet and has approached you. They have asked you for a price quote as well. But they want to see a virtual machine implementation and simulation results before they commit to purchase anything.

You can use Virtual Machines for the implementation and the security attacks. The server network should consist of one server, i.e. Windows2008/2012 or Linux (Ubuntu or others).

It should be connected to one workstation (at the least), i.e. Windows Server to Windows client or Linux Server to Linux client. The workstation denotes a different LAN.

Your tasks: You should write a report with the appropriate details (2500 words max, but flexible) documenting all that you have done including how the servers are setup, how they are tested and how the attacks are done to them along with countermeasures. Use the tasks below as a guideline to write.

Question 1. Using the Virtual Machines, configure ANYONE server namely Windows2008/2012 or Ubuntu(or other Linux servers), with the following: (i) DNS server (ii) DHCP server (iii) web server. Use a client computer to test the three servers to see if it works properly. Capture the appropriate screen shots or illustrate that through commands and output screens. Draw a simple network or workflow diagram of your network.
Hints:
• DNS Server: Show that the smithlogistics.com (or similar) domain name is configured and that the clients could join it. Create some users and login in to the domain. Test what was implemented.
• DHCP Server: Show the dynamic IP address assignment with an address pool along with evidence
of clients receiving dynamic IP.
• Web server: Configure IIS and Apache with web address www.smithlogistics.com (or similar) can be accessed from the web client. Test the web server with a sample webpage being accessed from the client. Install an SSL certificate to make it secure.

Question 2. Implement at least four security attacks on the servers through Kali Linux or other independent tools and suggest countermeasures to stop them. Illustrate the attacks through commands or using GUI tools. Capture the attacks through screen shots or graphs or tables.

Question 3. Show the detailed cost of implementing your solution, in a table format. You can try to show two different costs for the company to choose from.
Hints: Research on the costs of servers (hardware and software), switches, workstations, cables, etc.

Question 4. Show all references used in the report, using appropriate referencing.

Hints: Harvard referencing can be used and make sure the format is fully followed.

Attachment:- System Administration and Security.rar

Reference no: EM132485893

Questions Cloud

How your understanding of beliefs led to your performance : Please rewatch the video that we watched in class and pay attention to the "Beliefs That Make You Stupid." For each belief, write one paragraph explaining.
Describe the information-processing theory : Describe the Information - Processing Theory (Three System Memory) on how we take something from our world and eventually put it into long term memory?
What type of pension plan would an employee want offered : What type of pension plan would an employee (not employer) want offered to them, a defined contribution plan or a defined benefit plan?
Different methods of intervening to reduce stress : Compare and contrast different methods of intervening to reduce stress.
CIS4017 System Administration and Security Assignment : CIS4017 System Administration and Security Assignment help and solution, Teesside University - assessment writing service - what security properties
What would the before-tax lease payments : What would the before-tax lease payments have to be to make your firm indifferent between leasing and buying the fabricator?
Military interrogations related to forensic psychology : What is the ethical implications of Psychologists' involvement in military interrogations related to forensic psychology
What is regular income tax liability for the year : Assume that Eva is considered to be an employee. What is her regular income tax liability for the year? (Round your final answer to 2 decimal places.)
Describe the information-processing theory : Describe the Information - Processing Theory (Three System Memory) on how we take something from our world and eventually put it into long term memory?

Reviews

Write a Review

Other Subject Questions & Answers

  Explain how might deal with the clients tardiness

Explain how you might deal with this client's tardiness.While conducting a group for adults struggling with addiction, one of the participants has come

  Which population does each organization serve

As you discovered in this week's lectures and textbook readings, numerous vulnerable populations exist in the community. Identify three local organizations.

  Identify nursing interventions for each client outcome

Identify 3 nursing interventions for each client outcome and give rationales. Identify what weakness in the client's life and supports may be impacting.

  Demonstrate a strong thesis statement supported by research

It should demonstrate a strong thesis statement supported by research from at least 5 different sources. Provides APA citations for at least 5 research sources.

  Example of conflict theory

Example of conflict theory and current event to relate to that  theory. Need to complete short assignment

  What are the functions of the wto

Please prepare a 1-2 page paper on the WTO. What is it? How does a country become a member? What are the functions of the WTO? Is the organization a positive or negative influence on international trade or is it both?

  How you would use informatics and communication methods

Discuss how you would use informatics and communication methods to advocate for community public health programs and policies.

  Are the allocation bases suggested in the case reasonable

Case - Harbor City Electric. Are the allocation bases suggested in the case "reasonable"? If not, how would you change them? Which of the two bases under discussion for the maintenance and repair cost center would you use? Why

  Deaths related to the use of venous drugs

When discussing drug use in countries such as the Netherlands, where drugs have been legally obtainable since 1976.

  Identify environmental experiences that influenced yourlife

Identify the key environmental experiences that influenced yourlife. Identify key environmental events that forced you to think aboutyour environmental values.

  How did the judge react to the parties arguments

How did the judge react to the parties arguments? Can you tell how the judge views the case from the type or nature of the judge's questions or reactions

  External and internal organizational consultation

What are important considerations for external and internal organizational consultation?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd