o o QUESTION 1 a. Consider an automated teller machine (ATM) to which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement. Answer 1: Confidentiality: To access debit or credit cards one must enter a security password which is available only to authorized users and aimed at further enhancing the level of security. While securing the PIN of a respective card it is the responsibility of end user to ensure they use a strong pin. Banks also need to ensure privacy whenever a communication is happening in between ATM and bank server to prevent hacking. The entire transaction needs to be properly secured so to avoid any kind of harm or hackers cracking the card pins and accessing (Ajaykumar & Kumar, 2013). Proper encryption of PIN ensures that high level of confidentiality is maintained while lack of attention towards the same could lead to breach of data or customers information. Moreover, the policy related to changing PIN after regular intervals will help boost the customers and keep data and information secure. Integrity: Use of advanced, efficient technology and proper optimization & Collaboration of ATMs is necessary to ensure their integrity is maintained and customers information is secure. Both in case of withdraw and deposit, systems must be updated chronologically with authentic data and does not affect the customer account in any manner. Withdrawals of money should reflect as debits on the account, deposit of funds would result in credit of account. Moreover, a section or committee should be incorporated to handle queries of customers which are related with mismatch of account due to use of ATM. Availability: The frequency of ATM should enhance depending upon the demand of the customers and further should be frequently updated with cash to provide accurate services. While ATM which is out of service could lead to customer dissatisfaction, that of ATM with accuracy in services could attract more and more customers. Answer 2: It is noticed that an ATM machine contains 0-9 numeric key along with some special key. According to the given scenario, it is identified that the thief already breaks the 5 numeric keys. Therefore, he has the opportunities of making combination for ATM password that should be followed within the rest 5 keys. As an ATM pin consists 4 number, it will allow thief in entering 4 digits where the number will be 0000 at lower level and 9999 at higher level because in integer value, 0 is the lowest and 9 is the highest value. Therefore, the maximum combination will be the following: 5 P 4 = 5! / (5-4)! =5! /1! = (54321)/1= b. Repeat question a for a telephone switching system that routes calls through a switching network based on the telephone number requested by the caller. c. Consider a desktop publishing system used to produce documents for various organizations. i. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement. ii. Give an example of a type of publication in which data integrity is the most important requirement. iii. Give an example in which system availability is the most important requirement. d. List and briefly define the fundamental security design principles. QUESTION 2 a. For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers. i. An organization managing public information on its Web server. ii. A law enforcement organization managing extremely sensitive investigative information. iii. A financial organization managing routine administrative information (not privacyrelated information). iv. An information system used for large acquisitions in a contracting organization contains both sensitive, pre-solicitation phase contract information and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole. v. A power plant contains a SCADA (supervisory control and data acquisition) system controlling the distribution of electric power for a large military installation. The SCADA system contains both real-time sensor data and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole. b. Develop an attack tree for gaining access to the contents of a physical safe. v. Aristotle vi. tv9stove vii. 12345678 viii. dribgib b. The inclusion of the salt in the UNIX password scheme increases the difficulty of guessing by a factor of 4096. But the salt is stored in plaintext in the same entry as the corresponding ciphertext password. Therefore, those two characters are known to the attacker and need not be guessed. Why is it asserted that the salt increases security? c. Assuming you have successfully answered the preceding problem and understand the significance of the salt, here is another question. Wouldn’t it be possible to thwart completely all password crackers by dramatically increasing the salt size to, say, 24 or 48 bits? d. For the biometric authentication protocols, note the biometric capture device is authenticated in the case of a static biometric but not authenticated for a dynamic biometric. Explain why authentication is useful in the case of a stable biometric, but not needed in the case of a dynamic biometric.