Securities Issues in a company, Computer Network Security

Assignment Help:

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these:

  • A suitable device (such as a mobile phone) may interact with another device (another phone, or a simple tag, or some other fixed reader), provided the two devices are held in close proximity, or 'tapped' together. In order to communicate, simple tags can derive their power from the nearby device.
  • Moderate amounts of data may be exchanged (one-way or two-way) in such interactions - a few kBytes, typically.
  • Management of data relevant to such interactions might be stored in the ordinary memory of the phone, or might be undertaken by a secure element such as the SIM card. In a payment application, for example, the 'cash balance' might be recorded by the card, that card running a protocol with the remote card, intended to ensure that a rogue application could not corrupt its legitimate operation. Such secure storage is characterized by high qualities of security, and very limited storage capacity.

One topic of debate among security experts is whether the 'near field' property can be subverted - for example, whether special antennae could eavesdrop from a distance: this is likely to be the case, in the right circumstances.

Suppose a supermarket has decided to use NFC to enhance shoppers' experience, and to attempt to induce its customers (or potential customers) to buy more items.

Crucially, this will involve giving the shoppers a special app to run on their smartphones, and will involve placing relevant tags on shelves and/or individual products. Three phases of app roll-out are envisaged:

1. The app allows shoppers to look up information about products - such as their nutritional content - before buying them. The shopper's phone is tapped onto the relevant shelf label to receive such information.

2. the app receives vouchers and special offers, pushed by the supermarket (perhaps on a schedule, perhaps based on the shopper's habits, perhaps when tapped on a shelf to activate a particular offer, or perhaps when the phone's location service indicates proximity to this supermarket or a competitor's shop).

3. The app allows shoppers to scan each item they place in their trollies (much as some supermarkets currently allow with hand-held barcode scanners); 3 stored vouchers are automatically applied; upon leaving the shop, the app automatically triggers an online payment for the full cost of the contents of the cart

Your task is to identify the threats inherent in this scenario (or, these scenarios, regarding each phase separately). Describe each threat, making clear the anticipated motive(s) of the attacker(s). There may be significant high-level design decisions to be made which will impact the security of the solution: explain what these are, and what their implications are.

Which threats would you expect to give rise to the biggest risks? Explain your answer. Your answer will necessarily be incomplete without an assessment of vulnerabilities, which is out of scope. Is there any other information you would need in order to complete a risk assessment?


Related Discussions:- Securities Issues in a company

Example of an attack against a windows, The objective of this example is to...

The objective of this example is to demonstrate the steps required for a successful attack against a vulnerable Windows XP SP2 system. It will show: a) how Nessus can be used to di

Transmission errors in networking, TRANSMISSION ERRORS:  Transmission...

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Basic functions of e-mail system, B a s i c functions of e-mail system ...

B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be

Define broadcasting , Broadcasting is the distribution of video and audio...

Broadcasting is the distribution of video and audio content to a whole audience via any audio or visual mass communications medium, but generally one using electromagnetic radiat

Packet filtering firewall-dynamic packet filtering, Dynamic Packet Filterin...

Dynamic Packet Filtering Dynamic Packet Filtering is also referred to as stateful firewalling. Here the firewall maintains the status of connections as well. When a connection

Define byte stuffing, Sometimes the special character may see in data and a...

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

CS, Discuss how developers should apply the following countermeasures to im...

Discuss how developers should apply the following countermeasures to improve the security of their code:

The major decision hierarchy for disclosing security problem, QUESTION ...

QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

Incident response, Incident Response: Complete the following sections as id...

Incident Response: Complete the following sections as identified from your Incident Response template (in MS Word format): Update the table of contents (autogenerated) Separate

Need for security-information security, NEED FOR SECURITY Primary missio...

NEED FOR SECURITY Primary mission of information security to ensure that the systems and contents stay the same If no threats, could focus on improving the systems, resulting in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd