CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor CSCI4911 Special Topics: Computer Security Final Exam Due Tuesday Dec 10thth 2013 by 5pm INSTRUCTIONS 1. Please answer all 10 questions in this document (in the boxes provided) and email it to Robert.owor@asurams.edu on or before Tuesday December 10th 2013, 5pm. Each question is worth 10 points. Make sure you include your first and last name in the document, when you email it as an attachment. 2. In the Subject Header of the email, you should include the following: CSCI4911 Special Topics: Computer Security Final Exam, Your Last Name, Your First Name, and Due Date. Late Exam submissions are not accepted except where a valid excuse with evidence is provided. 3. Use Times Roman Font size: 10 to answer all your questions. STUDENT DETAILS LAST NAME: FIRST NAME: DO NOT WRITE ANYTHING BETWEEN THE LINES BELOW: INSTRUCTOR’S EVALUATION SCORE: COMMENTS: CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q1. Should Governments trust Commercial Off the Shelf Software and hardware? What are some of the risks in COTS hardware and software, particularly if it is manufactured in a foreign country? List at least 5 risks. (10 points) CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q2. Using a real life scenario of sending money by text messaging, outline how two-factor encryption can be used to authenticate the messages described in parentheses (I have sent you money; I have received your message about sending me money; I have received the money; I have received the message that you have received the money; use identity, transactionID, Origin, Destination, time, amount and any other variables you think might help, without exchanging more than 4 messages i.e. two messages from the Sender and two messages from the receiver). (10 points) CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q3. Explain 5 five points of concern you would take into account when designing a decryption scheme. (10 Points) 3. Comment on the statement “normal flow is the best-case scenario.” What are some of the Q4. Using three real life examples, explain how an attacker might compromise each of the following: CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q4. In each of the following 4 scenarios, explain how an attacker might compromise security (a) Userid and Password page on the web (b) A Blog or Bulletin Board Forum (c) A For or While loop in an executable file using buffer overflows. (d) An Online Credit Card Operation (10 points) 4. What is the difference between an information system and information technology? CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q5. What is the role of packet filtering in firewall security? Outline at least 3 packet filtering strategies you would recommend to meet your security goals. (10 Points) CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q6 Outline a real life scenario for each of the following attack cases: Interruption, Interception, Modification, and Fabrication. How do each of these attacks relate to Availability, Integrity, Confidentiality and Authenticity? (10 Points) CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q7. What is a Man-In-The-Middle-Attack (MITMA)? Give an example of software MITMA and hardware MITMA (10 Points) CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q8. What is a Security Model? Discuss the steps you would take to design a Security Model? List at least 7 steps. (10 Points) CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q9. Supposing you were asked to prepare a Contingency/Disaster Recovery Plan, Outline the steps you would take. (10 points). CSCI4911 SPECIAL TOPICS: COMPUTER SECURITY FINAL EXAM FALL 2013 – Dr. Robert Owor Q10. Write brief notes (one paragraph or not more than 5 sentences) on each of the following: (a) (b) (c) (d) (e) The MD5 Algorithm The Feistel Algorithm Elliptical Curve Cryptography RSA Encryption Triple DES Algorithm