Securities Issues in a company, Computer Network Security

Assignment Help:

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these:

  • A suitable device (such as a mobile phone) may interact with another device (another phone, or a simple tag, or some other fixed reader), provided the two devices are held in close proximity, or 'tapped' together. In order to communicate, simple tags can derive their power from the nearby device.
  • Moderate amounts of data may be exchanged (one-way or two-way) in such interactions - a few kBytes, typically.
  • Management of data relevant to such interactions might be stored in the ordinary memory of the phone, or might be undertaken by a secure element such as the SIM card. In a payment application, for example, the 'cash balance' might be recorded by the card, that card running a protocol with the remote card, intended to ensure that a rogue application could not corrupt its legitimate operation. Such secure storage is characterized by high qualities of security, and very limited storage capacity.

One topic of debate among security experts is whether the 'near field' property can be subverted - for example, whether special antennae could eavesdrop from a distance: this is likely to be the case, in the right circumstances.

Suppose a supermarket has decided to use NFC to enhance shoppers' experience, and to attempt to induce its customers (or potential customers) to buy more items.

Crucially, this will involve giving the shoppers a special app to run on their smartphones, and will involve placing relevant tags on shelves and/or individual products. Three phases of app roll-out are envisaged:

1. The app allows shoppers to look up information about products - such as their nutritional content - before buying them. The shopper's phone is tapped onto the relevant shelf label to receive such information.

2. the app receives vouchers and special offers, pushed by the supermarket (perhaps on a schedule, perhaps based on the shopper's habits, perhaps when tapped on a shelf to activate a particular offer, or perhaps when the phone's location service indicates proximity to this supermarket or a competitor's shop).

3. The app allows shoppers to scan each item they place in their trollies (much as some supermarkets currently allow with hand-held barcode scanners); 3 stored vouchers are automatically applied; upon leaving the shop, the app automatically triggers an online payment for the full cost of the contents of the cart

Your task is to identify the threats inherent in this scenario (or, these scenarios, regarding each phase separately). Describe each threat, making clear the anticipated motive(s) of the attacker(s). There may be significant high-level design decisions to be made which will impact the security of the solution: explain what these are, and what their implications are.

Which threats would you expect to give rise to the biggest risks? Explain your answer. Your answer will necessarily be incomplete without an assessment of vulnerabilities, which is out of scope. Is there any other information you would need in order to complete a risk assessment?


Related Discussions:- Securities Issues in a company

Firewalls-information security, Firewalls A firewall in an information s...

Firewalls A firewall in an information security program that prevents specific types of information from moving between the outside world and the inside world. The firewall may

Elliptic Curves, #questioAn elliptic curve y^2=x^3+ax+b(mod29) includes poi...

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Virtual packets, VIRTUAL PACKETS These data packets serve same reason ...

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

Name the various layers of the osi model, Problem (a) Name the various ...

Problem (a) Name the various layers of the OSI model. (b) Show, by means of a diagram, how  the TCP/IP  reference model  is different from the OSI-7 reference model? Why is

Who are the individuals who cause these security problems, Who are the indi...

Who are the individuals who cause these security problems? Many unauthorized people who cause network security problems for obtaining information about the other users and causi

Describe the terms prime number and prime factorisation, (a) An opponent is...

(a) An opponent is using RSA with the public key {e=53, n=77}. You intercept the ciphertext C=10. (All values on this problem, including the ciphertext and the cleartext, are nume

Describe privacy-protecting techniques, Question: a) What do you meant...

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif

Limitations of ethical dilemma, The best results obtained in the PIIT class...

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

Define checksum, The method used to check errors is checksum . In this m...

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

Introduction to planning for security, INTRODUCTION TO PLANNING FOR SECURIT...

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd