CYBS 6350 Data Protection Final Exam Spring 2020 1. What is the difference between the authentication problem and the identification problem in data protection? (10 points) Answer: Identification: Identification is the method of expressing the identity of the device. It's done in the early stages of getting access to the network, and that's what happens when the user claim to be a specific device used. The argument may come in the form of offering the username during the authentication process; placing the finger on the scanner; putting the name on the guest list or any other way the user asserts the identity to access it. Identification is not mandatory for certain schemes, such as ATM cards, where someone with the appropriate code can access the account without being known. Authentication: It is the approach used to reveal the identity of the system. This includes verifying the authenticity of the identification before the approval process. The method of verifying the authenticity of the evidence presented in support of the asserted identity must be sufficiently reliable to identify impostors. Authentication typically happens after an ID is completed, such as when the user has a password to assist a username during the login phase. However, this could happen at the same time as the recognition process. Difference between the authentication problem and the identification problem in data protection: The primary distinction between them is that the identification refers to the acquisition of identity, while the authentication refers to the tests carried out to maintain the authenticity of the identity asserted. Simply put, an identity assertion is part of the identification process, while an authentication process requires evidence of that identity. Authentication Problem: The problems with passwords: Encryption keys are by far the most used and easily subverted form of personal encryption. When a company introduces protocols to secure passwords the inconvenience is so severe that such a policy would be broken in many instances. The user knows that this is the case with the examination of data centers containing sensitive data. When security staff adopts a policy of secure passwords, workers can write nonsensical codes for easy access usually in areas where these paper documents are easily compromised. If a company does not enforce stringent guidelines on password management, easily identifiable words would be preferred. The problems with smartcards: There are always the risk when using smartcards is that the machine has been compromised with a secret program routine that exploits the user's identity after encryption has been completed. As users authenticate themselves to an unsecured computer, they could never be safe in their corresponding computer purchases. The biggest restraint of the use of smartcards in digital commerce is their range. The chances of using smart cards as a standardized means of authentication for entities in electronic commerce are null and void. The problems with biometrics: With biometric, a person may recognize the fingerprint or iris scan. The methods for collecting biometric records are neither easy nor inexpensive. Even then, biometric data do not result in a fully secure program. Having a copy of an individual's fingerprints can be trivial. Some tools can record iris photographs of a person walking within a few steps of a video camera so that they could be replicated and used for unlawful purposes. The real issue with biometrics is that once the biometrics of a person has been damaged, they are compromised for life and could never be considered again. Identification Problem: Identification is essentially the process of someone who claims to be an individual. Users can mark themselves on the mobile as "John," flash a library card with a title on it or have a mail address with a name in front of the @ symbol. When an individual engages in genetic testing, the donation of a genetic specimen also results in the production of a large amount of personalized data. These data are extremely difficult to identify. Not all price discrimination is socially appropriate. Also, some may see price discrimination as a type of fundamental injustice and inequality. Therefore, the use of the information to compete against prices can be viewed as a violation of privacy given the fact that it has been aggregated and identified. Control of de-identification does not resolve the possibility that aggregate information may be used in a manner that user considers socially inappropriate, be it price discrimination, credit risk assessment or policing. However, if the personal contribution is de minimums, the cumulative contribution of all human data that have an impact on society that the user does not want to engage in. Not knowing who uses sensitive data. Redundant regulations yield redundant compliance projects. Annual security awareness programs don't cut it. Reference: 1. https://www.infosecurity-magazine.com/magazine-features/tackling-theauthentication-problem/ 2. https://itstillworks.com/difference-between-identification-authentication-3471.html 3. https://dataflow.com/read/problem-de-identification-privacy-control/140 2. After infecting a system, some viruses take steps to cleanse the system of any other malware. That is, they remove any malware that has previously infected the system, apply security patches, update signature files, etc. Why would it be in a virus writer’s interest to protect a system from other malware? (10 points) Answer: The main reason for such a virus attack is to gain ongoing access to the system. These types of attacks can be classified as Advanced Persistent Attacks. Cybercriminals usually gain entry through a network, an infected file, junk email, or an app vulnerability to insert malware into a target network. They implant malware that allows the creation of a network of backdoors and tunnels used to move around in systems undetected. The malware often employs techniques like rewriting code to help hackers cover their tracks. This is where the attacker removes his traces and presence in the system making it hard to detect any intrusion and network breach. This kind of virus infection in a system can be done for the reason such as: This type of attack is performed in a highly organized and sophisticated environment, the viruses are designed specifically to get around the existing security measures in place within a company, organization, and nation. This means the target is precisely chosen and intensive planning and gathering of resources are done such that they can achieve what they want, which is to take control of the environment. These attacks are performed by an unauthorized user who remains in the network for an extended period without being detected which is done solely for his agenda to enter the system again if needed. The evidence and traces of the attack are removed, leaving the network open so that other cybercriminals can continue the data breach. Reference: 1. https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html 2. https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html 3. What are QR codes? How are security features implemented in QR codes? Provide your responses in 100-words or more. (10 points) Answer: Quick Response codes, commonly abbreviated as QR codes, started as an extension of the standard UPC barcode commonly used in retail and production. Unlike a 1-D barcode, a QR code is a 2-D matrix code that conveys information by the arrangement of its dark and light elements in columns and rows. Originally developed for process optimization in the logistics of the automotive industry, the QR Code has found its way into mobile marketing with the widespread adoption of smartphones. The data in a QR code can be accessed by taking a picture of the QR code and processing it with a QR code reader. Anybody can read or write QR code messages with impunity. However, certain applications may require restricted access or verification of QR codes, and thus there is a need to design QR codes that meet various security specifications. Encryption: The first security standard for QR codes is Encrypted QR codes or EQRs. In SEQRs we use asymmetric encryption schemes where both the reader and the writer of the EQR share a secret key. The encryption scheme is extremely straightforward: encrypt the bits of the message using AES block cipher with the shared secret key. In PKEQRs we use the RSA public-key encryption scheme combined with AES, using a public RSA key to encrypt the AES key and including the encrypted key in the message. Signing: The next security standard we have devised is Signed QR codes or SQRs. The purpose of this encoding is to allow the reader to verify the source of the SQR before any action is performed. If the verified source is trusted, the user can proceed to open the URL or perform any other action the QR code initiates without fear of a security breach. The SQR standard requires more modification than the previous encryption methods, as the code must contain the message, the signature, and a way to identify the public key of the signer. Other attempts: They were made for a “proof of work” QR code. In this scheme, which takes its idea from Bitcoin, a QR code contains a message, a series of random bits, and the hash of the concatenation of those two. The catch is that the bits containing the hash are in regions usually reserved for fixed orientation patterns, namely the squares at the corners of the QR code. If the hash does not form the proper orientation patterns, the code will be unreadable. Reference: 1. https://courses.csail.mit.edu/6.857/2014/files/12-peng-sanabria-wu-zhu-qr-codes.pdf 2. https://www.qr-code-generator.com/blog/qr-code-security/ 4. Chapter 13 in your book talks about TLS. This problem is about the use of certificates in TLS. Read the narrative on page 238 in your book about certificates and certificate authorities (CAs). i. On your favorite browser, visit the University of Dallas’s home page. Find the certificate for this page on your browser. (You might have to do some research to find out how to access the certificate). Provide a screenshot of the certificate details. (10 points) Answer: 1. Certificate: University of Dallas home page certificate 2. Certificate Details of Home Page ii. Although security experts and cryptographers often claim that the whole certificate system is broken by design, it is one of the best solutions we have along with trust – on – first – use (TOFU) policy. Explain what TOFU means. (10 points) Answer: Trust On First Use (TOFU) is a security model in which a client needs to create a trust relationship with an anonymous server. To do that, clients will look for identifiers stored locally. If an endpoint is found, the client can establish the connection. There are many third-party endpoints that a user may not have used before and there may be no security certificate available for such endpoints. If no such endpoint is found, the client can prompt the user to determine if the client should trust the endpoint. Hence the first experience of the client with such endpoints is completely based on the level of trust that the client is willing to place of the new endpoint. TOFU is used in the SSH protocol, in HTTP Public Key Pinning (HPKP) where the browsers will accept the first public key returned by the endpoint, and in Strict-Transport-Security (HSTS) where a browser will obey the redirection rule. The purpose to use the Trust on first mechanism is to establishing trust where there was none before, typically based on a user decision. In cases where an administrator is setting up all components of the system, the TOFU is a good way to establish trust among the different components. 5. Chapter 13 further talks about how TLS can fail (pages 247-248). Summarize these failures AND provide a solution to each failure. (20 points) Answer: A TLS/SSL handshake failure occurs if the protocol used by the client is not supported by the server either at the incoming or outgoing connection. Compromised Certificate Authority There are hundreds of trusted CAs in our browsers, and each of them can produce certificates for any website on the web. That means if any of them gets hacked, and their private key released in the wild, the hacker can create a certificate for any website they want, and all of our browsers will see it as valid. Worse, they can make certificates for any use, including signing emails, encrypting VPN connections, etc. To be able to use such a certificate, the hacker would need to intercept traffic and insert their fake certificate in a Man-in-the-Middle (MitM) attack. The real solution to this is complicated, such as wide use of the Online Security Certificate Protocol (OSCP) or using trust networks and would require a major redesign of the way the Internet works. For now, browser makers are in the business of patching up after an event occurs. Compromised Server An exploited or hacked server is one that is no longer fully under your control. Someone else is now partially controlling your server and using it for their purposes. Here are some common reasons to exploit a server: Send out a spam email. Launch attacks against other servers. Thus, consuming your CPU, memory, and bandwidth resources. Install a phishing website on your server to gain access to sensitive information. The steps to be taken to maintain a secure server to makes sure it is not compromised now and in the future are: Use strong Password Use secure protocols Maintain regular backups Harden the PHP setting Compromised Client TLS security is compromised when the client is compromised by an attacker. The client can be the browser, server, or anything that is used to access data. When the client is compromised, the attacker has access to all the keys and can read the encrypted data as well. These attackers use the opportunity to create back doors to later access other data and install rogue CA certificates which allows them to access the TLS connection. To save the client-side it is important to maintain regular security checks, use higher security protocols, and make sure the CA certificates are valid. Bugs in Implementation Some major attack vectors arise from conceptual flaws in the TLS standard itself. Features prone to bugs and vulnerabilities include protocol downgrades, connection renegotiation, and session resumption. Incomplete or vague specifications, particularly when it comes to cross-protocol interactions (i.e. between TLS and application protocols such as HTTP) engender some serious vulnerabilities, particularly in case of cross-protocol attack vectors against TLS, of which there are a few. TLS vulnerabilities resulting from faulty implementations abound. Some of them give rise to cross-layer protocol attacks and/or side-channel attacks. Here is what you can do to mitigate any TLS vulnerabilities your tests uncover: deactivate all versions of SSL as well as TLS 1.0 and 1.1; activate TLS 1.2 and 1.3 turn off header compression in TLS (SPDY 3.1 is obsolete); TLS 1.3 has no header compression turn off the RC4 stream cipher (Rivest Cipher 4 also known as ARC4 or ARCFOUR, short for Alleged RC4) disallow renegotiation with clients get rid of export-grade ciphers (this alone will safeguard your server e.g. from FREAK) disallow insecure padding modes in TLS 1.2 (such as RSA PKCS#1 v1.5) disable vulnerable CBC MAC-then-Encrypt modes to guard against Vaudenay, Lucky13, POODLE, LuckyMinus20, and other attack vectors activate support for TLS_FALLBACK_SCSV, a protocol extension that prevents MITM attackers from forcing a protocol downgrade; current versions of OpenSSL offer this feature out of the box, but it only works if both the client and the server support it Reference: 1. https://www.cloudinsidr.com/content/known-attack-vectors-against-tlsimplementation-vulnerabilities/ 2. https://nakedsecurity.sophos.com/2015/03/04/the-freak-bug-in-tlsssl-what-you-needto-know/ 6. Blockchain has been proposed as a solution for many applications. One such application is electronic notaries. Acronis is a provider of blockchain-based notary solutions. Read their work here https://www.acronis.com/en-us/articles/data-protection/ and summarize how data is protected using blockchain-notaries. (20 points) Answer: Blockchain technology has gained popularity for its role in crypto currencies. Aside from the use of blockchain technology in cryptocurrency, developers and researchers are working to build applications and services that leverage the power and versatility of the blockchain technology. Blockchain technology offers secure cryptographic techniques to store data that cannot be edited by other entities in the blockchain network. Acronis Notary with blockchain generates a timestamped hash, or fingerprint, of protected data and stores it in Ethereum, a public blockchain-based distributed computing platform. By comparing two fingerprints of the same data, Acronis Storage can verify the immutability, authenticity, and integrity of stored data. Acronis' software-defined storage solution also offers: High-speed performance through SSD caching, auto load balancing, auto data distribution, and parallel replication. A complete set of industry-standard storage connectivity and APIs including Amazon S3 and iSCSI. Configurable levels of redundancy for stored data through Acronis Cloud RAID and allows data authenticity verification through blockchain-based immutable logging and watermarking. Provides high throughput solutions to store and exchange significant volumes of data in a secure and verifiable manner Where anti-tampering and verification are ensured by the blockchain algorithm. Acronis Notary protects data from being tampered and deleted as the data immutability is protected algorithmically by using blockchain technology. A carefully designed service architecture ensures the high throughput necessary for a wide range of industrial solutions. Because of this, Acronis Notary can be introduced as a proxy on any existing data stream and requires no changes in the existing processes or infrastructure. Reference: 1. https://www.acronis.com/en-us/articles/data-protection/ 7. Read the following article on quantum supremacy and how top tech companies are vying to claim it. In your own words, explain what quantum supremacy means for data protection. (10 points) https://www.sciencenews.org/article/google-quantum-supremacy-claimcontroversy-top-science-stories-2019-yir Answer: Quantum supremacy shows that researchers have been able to use a quantum computer to perform a single calculation that no conventional computer, even the biggest supercomputer, can perform in a reasonable amount of time. In the case of Google finding, the calculation involved checking whether the output of an algorithm for generating random numbers was truly random. The researchers were able to use the quantum computer to perform a complex mathematical calculation in three minutes and 20 seconds. Google demonstrated that a Summit 3 an IBM built machine which is the world's most powerful commercially available conventional computer would take about 10,000 years to perform the same task. Quantum Supremacy and its relation to Data Protection The General Data Protection Regulation (GDPR) requires data controllers and processors to process personal data in a manner that ensures the security of the personal data, including protection against unauthorized or unlawful processing and accidental loss, destruction or damage, using appropriate technical or organizational measures. Technological developments, including the developments in quantum computing, may pose new challenges for data controllers, as they should take into account emerging new technologies that may jeopardize the long-term applicability of solutions applied by them to ensure an adequate level of data protection in line with the state of the art. This may be especially relevant in case of data processing activities planned for the long term since data controllers shall react to challenges on time. Data protection by design requires data controllers, both at the time of the determination of the means for processing and at the time of the processing itself, to implement appropriate technical and organizational measures, such as pseudonymization, which are designed to implement data-protection principles, such as data minimization, effectively and to integrate the necessary safeguards into the processing to meet the requirements of the GDPR and protect the rights of data subjects. The alleged achievement of quantum supremacy is a great scientific success; however, we are still far from the everyday and widespread application of the technology. Reference: 1. https://gdpr.blog.hu/2019/10/05/quantum_supremacy_and_data_protection 2. https://economictimes.indiatimes.com/magazines/panache/quantum-supremacy-andthe-threat-it-poses-to-data-storage-digital-economy/articleshow/71938704.cms