CS 433

advertisement
Daniel Jordan
daniel_jordan@csu.fullerton.edu
CPSC 333
Homework #1
Due September 11 (before 11:55 PM)
R-1.1
Compare and contrast the C.I.A concepts for information security with the A.A.A. concepts.
C.I.A stands for confidentiality, integrity, and availability. C.I.A. aims to secure data through confidentiality,
verify the data through integrity, and protect the data through availability. A.A.A stands for Authenticity,
assurance, and anonymity. Authenticity is used to authenticate the security token being used to access the
system. Assurance refers to how trust policies are managed on a system. And anonymity assures that certain
transaction records will not be linked to any single user. A.A.A doesn’t directly protect the data the way
C.I.A. does. Instead, it focuses on authenticating the user and system accessing the data.
R-1.4
What are some of the techniques that are used to achieve confidentiality?
Some techniques used to achieve confidentiality are encryption, access control, and authentication.
Encryption is used to protect data, ensuring only those who are allowed to see the data will be able to access
it. Access control provides rules and policies that limit which files a user can access. Authentication is used to
verify a user’s access role, and determine whether they’re authorized to access the data.
R-1.12
Compare and contract symmetric encryption with public-key encryption, including the strengths and weaknesses of
each.
A symmetric encryption requires each communicating user to share a separate private key. A public-key
encryption uses a single public key from the sender, and a private key held by the recipient. An advantage of
public-key encryption is that the key is stored locally on each users’ machine. The key is not transmitted, so
an eavesdropper would not be able to intercept the message and steal the key. An advantage of symmetric
encryption is speed, since both users are using the same shared key to encrypt and decrypt the message. A
disadvantage of symmetric encryption is that the private-key is transmitted with each message, which leaves
it open to attack.
R-1.13
List at least three security risks that could arise when someone has their laptop stolen.
The most obvious security risk is the user’s passwords that are stored on the laptop could be stolen. An
attacker could also steal private key files off the machine. Lastly, they could use personal information found
on the laptop to better guess a user’s password, or gain access to their account in other ways.
R-1.16
Give an example of the false sense of security that can come from using the “security by obscurity” approach.
An example of security by obscurity would be a user running an SSH server on their home machine, and
changing the port number. Because SSH runs by default on port 22, this may create a false sense of security,
because the attacker must find the port number before they can even attempt breaking into the system. This
has been shown to be false, as a quick port scan will reveal the open port.
R-1.19
Suppose you could use all 128 characters in the ASCII character set in a password. What is the number of 8character passwords that could be constructed from such a character set? How long, on average, would it take an
attacker to guess such a password if he could test a password every nanosecond?
128 possible characters to choose from = 128 128 128 128 128 128 128 128 = 1288 possible passwords
1 second = 1,000,000,000 nanoseconds.
1288 passwords / 1,000,000,000 = 72057594.0379 seconds.
72057594.0379 seconds / 60 = 1200959.90063 minutes
1200959.90063 minutes / 60 = 20015.9983438 hours
20015.9983438 hours / 24 = 833.999930992 days
833.999930992 days / 365 = 2.28 years to guess password
Download