0% found this document useful (0 votes)
283 views6 pages

Part 2

The document provides responses to questions about computer security. 1. It estimates that a symmetric session key will need to be over 200 bits long to be considered strong in 30 years due to increasing processing power. 2. NIST criteria for selecting encryption algorithms relate to Shannon's original standards around secrecy, efficiency and error handling, though NIST allows for message alterations during encryption errors. 3. The program computing a sum could be sabotaged by altering source code or object code to change the input values during execution. Confinement could help limit this by acting as a filter between callers and the program.

Uploaded by

Lewis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
283 views6 pages

Part 2

The document provides responses to questions about computer security. 1. It estimates that a symmetric session key will need to be over 200 bits long to be considered strong in 30 years due to increasing processing power. 2. NIST criteria for selecting encryption algorithms relate to Shannon's original standards around secrecy, efficiency and error handling, though NIST allows for message alterations during encryption errors. 3. The program computing a sum could be sabotaged by altering source code or object code to change the input values during execution. Confinement could help limit this by acting as a filter between callers and the program.

Uploaded by

Lewis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Student’s Name

Computer Security

Student’s name

University affiliation

Date
COMPUTER SECURITY
Answer the following questions:

1. The total processing speed of microprocessors (based on clock rate and number

of circuits) is doubling roughly every year. Today, a symmetric session key needs to be

100 bits long to be considered strong. How long will a symmetric session key have to be

in 30 years to be considered strong?

Encryption of data and information is important to ensure the security of important

data. The algorithms used to encrypt the data are different and they have unique structures

that require users to have decryptors or keys necessary to decrypt the data. The symmetric

session key allows the encryptor to set a key that matches the key used for decryption.

However, this form of encryption algorithm can be exploited through the brute forcing of the

key over a password or dictionary list or the generation of random character values that are

tested against the data provided. For small keys, the process can be fairly fast but when the

key is long, the process can take very long. Modern day computer processors are able to

handle the brute forcing process pretty fast as opposed to the traditional processors. It is

possible to find processors on GPU cards that are specifically designed to have a high

computing power that can be able to handle the brute forcing process. Also, with quantum

computers, the process is further enhanced and it can be able to brute force the key used in a

matter of hours even when the key is long. A high processing power renders this form of

encryption to be unusable as it can only take a matter of hours or days to have they key

generated. If the processing speed in quantum computers is used, then the process we be less

challenging as the decryption can be performed in a matter of minutes even with long keys

more than 100 bits long.

2. How do NIST criteria for selection of DES and AES relate to Shanon's original

standards of a good cryptographic system? What are the significant differences? How

do these standards reflect a changed environment many years after Shannon wrote his

standards?
COMPUTER SECURITY
Shanon’s original standards can be related to NIST modern criteria for a good cipher.

The characteristics defined in Shannon’s standard include: the level of secrecy determines

which algorithm is appropriate with a labour amount for encryption and decryption. This

characteristic is still in use in the modern NIST criteria for a good cryptographic system

where the complexity of the encryption is determined by the importance of the data and the

amount of privacy required. Also, in Shanon’s standards, the keys and the algorithm should

be free from complexities. This can be related to NIST’s criteria where the structure of the

algorithm should be clear and efficient for the encryption and decryption processes. Shanon’s

standard state that the errors of the ciphering algorithm and process should not affect the

message. This is similar to NIST’s criterial where the encryption algorithm only ciphers the

message data but no changes are made to the data. Finally, in Shanon’s standard no addition

or deletion should be made to the data which is similar to NIST’s criteria. There is a

difference in the modern NIST’s criteria to Shanon’s standards where there is an error in the

AES or DES encrypting, there may be alterations to the message data.

3. A program is written to compute the sum of the integers from 1 to 10. The

programmer, well trained in reusability and maintainability, writes the program so that

it computes the sum of the numbers from k to n. However, a team of security specialists

scrutinizes the code. The team certifies that this program properly sets k to 1 and n to

10; therefore, the program is certified as being properly restricted in that it always

operates on precisely the range 1 to 10.

(a) Explain different ways that this program can be sabotaged so that during

execution it computes a different sum, for example, 3 to 20.

It is possible for a user to alter the performance of a program during execution. This

can be through changing the source code before it is compiled. Also, the source code can still

be patched to alter the binary code that is stored on the disk before it can be executed.

Finally, it is possible to change the object code using an outside process. Through the
COMPUTER SECURITY
methods stated, the execution of a program can be altered to use different values that are not

specified in the program code.

(b) One means of limiting the effect of an untrusted program is confinement:

controllingwhat processes have access to the untrusted program and what access the

program has to other processes and data. Explain how confinement would apply to the

above example.

In the case that the program only computes a sum of numbers ranging between 1-10,

then the confinement process would act as a filter between the callers and the untrusted

program. The calling function will request the confining process to call the summation

program. This will limit the calling program from having direct access to the summation

program. Also, the confining process checks if the solution provided is reasonable when the

input values are considered.

4. The distinction between a covert storage channel and a covert timing channel is not

clear-cut. Every timing can be transformed into an equivalent storage channel. Explain

how this transformation could be done.

Covert require a clock that is shared to check time in the case bits become available in

the covert resource and when they need to be replaced. Hence, even with pure storage

channels, there is the element of timing. A covert timing channel works by modulating the

time at which something occurs. Thus, the table entry or the something itself becomes the

shared resource visible to the two cooperating processes form which the covert channel is

built.

Part B : 20 Marks

1. Research the TJX data breach case on the web and answer the following questions.
COMPUTER SECURITY
a. Was the TJX break-in due to a single security weakness or multiple security

weaknesses? Explain.

The TJX data breach was as a result of a combination of multiple vulnerabilities that

were exploited in their systems and processes. The encryption used for the security of data

was WEP. This encryption was used to encrypt debit and credit cards, cheques and other

electronic merchandise. It was determined that the attackers easily decrypted these data using

decryption tools and obtained the data through skimming. The systems also had

poorlysecured in-store computer kiosks that enabled direct access to the IT main systems as

users could easily upload requests to the jobs database and make their applications. This

clearly was a firewall issue that was not properly configured to keep the systems secure from

direct access from the malicious attackers. There was also a poorly configured WI-FI

network where endpoint devices were used to decode data streaming which resulted to the

hacking of the central database through the wireless connection. Also, the employees at TJX

were not vigilant and strict enough to make sure that they prevent unauthorized access to

terminals where the data thieves swapped the store’s PIN-pad terminal multiple times using

devices that were used to capture customers’ account numbers and PIN. Later they returned

to the with altered terminals to replace the original customers’ information.

b. Suggest a set of measures which probably would have prevented the TJX data

breach. Justify your answer.

Some changes should be enforced to prevent the TJX data breach. These include:

Replacing the existing WEP security with a WPA encryption that offers better security. Also,

the terminal systems should not save the customer data stored on the magnetic strip. Also, all

the USB access in all in-store kiosks should be disabled so that no user can run malicious

applications from these devices. They should also configure a strong firewall system that will
COMPUTER SECURITY
protect the systems form malicious entries from untrusted sites. They should also test their

ecommerce systems that should be fixed to ensure they are not susceptible to SQL injections.

Their software system should also be updated to patch any vulnerabilities that are identified.

They should also hire penetration testers who can be able to use advanced skills to identify

vulnerabilities in their system. The team of the security testers will report on any loopholes

they find on these systems. Finally, they should upgrade their POS systems to use “Chip-and

PIN” technology for all the cards in use, which will provide more security.

c. Which of the CIA goals did TJX fail to achieve in this attack?

TJX failed to provide system logs that would have been useful to perform a forensics

audit to identify the exact transactions that took place, their time and date of the transaction,

and the locations that these transactions took place. For all systems, the logs play an

important role in determining the specifics of an attack which was not possible with TJX

systems that did not store the transaction logs.

You might also like