Part 2
Part 2
Computer Security
Student’s name
University affiliation
Date
COMPUTER SECURITY
Answer the following questions:
1. The total processing speed of microprocessors (based on clock rate and number
of circuits) is doubling roughly every year. Today, a symmetric session key needs to be
100 bits long to be considered strong. How long will a symmetric session key have to be
data. The algorithms used to encrypt the data are different and they have unique structures
that require users to have decryptors or keys necessary to decrypt the data. The symmetric
session key allows the encryptor to set a key that matches the key used for decryption.
However, this form of encryption algorithm can be exploited through the brute forcing of the
key over a password or dictionary list or the generation of random character values that are
tested against the data provided. For small keys, the process can be fairly fast but when the
key is long, the process can take very long. Modern day computer processors are able to
handle the brute forcing process pretty fast as opposed to the traditional processors. It is
possible to find processors on GPU cards that are specifically designed to have a high
computing power that can be able to handle the brute forcing process. Also, with quantum
computers, the process is further enhanced and it can be able to brute force the key used in a
matter of hours even when the key is long. A high processing power renders this form of
encryption to be unusable as it can only take a matter of hours or days to have they key
generated. If the processing speed in quantum computers is used, then the process we be less
challenging as the decryption can be performed in a matter of minutes even with long keys
2. How do NIST criteria for selection of DES and AES relate to Shanon's original
standards of a good cryptographic system? What are the significant differences? How
do these standards reflect a changed environment many years after Shannon wrote his
standards?
COMPUTER SECURITY
Shanon’s original standards can be related to NIST modern criteria for a good cipher.
The characteristics defined in Shannon’s standard include: the level of secrecy determines
which algorithm is appropriate with a labour amount for encryption and decryption. This
characteristic is still in use in the modern NIST criteria for a good cryptographic system
where the complexity of the encryption is determined by the importance of the data and the
amount of privacy required. Also, in Shanon’s standards, the keys and the algorithm should
be free from complexities. This can be related to NIST’s criteria where the structure of the
algorithm should be clear and efficient for the encryption and decryption processes. Shanon’s
standard state that the errors of the ciphering algorithm and process should not affect the
message. This is similar to NIST’s criterial where the encryption algorithm only ciphers the
message data but no changes are made to the data. Finally, in Shanon’s standard no addition
or deletion should be made to the data which is similar to NIST’s criteria. There is a
difference in the modern NIST’s criteria to Shanon’s standards where there is an error in the
3. A program is written to compute the sum of the integers from 1 to 10. The
programmer, well trained in reusability and maintainability, writes the program so that
it computes the sum of the numbers from k to n. However, a team of security specialists
scrutinizes the code. The team certifies that this program properly sets k to 1 and n to
10; therefore, the program is certified as being properly restricted in that it always
(a) Explain different ways that this program can be sabotaged so that during
It is possible for a user to alter the performance of a program during execution. This
can be through changing the source code before it is compiled. Also, the source code can still
be patched to alter the binary code that is stored on the disk before it can be executed.
Finally, it is possible to change the object code using an outside process. Through the
COMPUTER SECURITY
methods stated, the execution of a program can be altered to use different values that are not
controllingwhat processes have access to the untrusted program and what access the
program has to other processes and data. Explain how confinement would apply to the
above example.
In the case that the program only computes a sum of numbers ranging between 1-10,
then the confinement process would act as a filter between the callers and the untrusted
program. The calling function will request the confining process to call the summation
program. This will limit the calling program from having direct access to the summation
program. Also, the confining process checks if the solution provided is reasonable when the
4. The distinction between a covert storage channel and a covert timing channel is not
clear-cut. Every timing can be transformed into an equivalent storage channel. Explain
Covert require a clock that is shared to check time in the case bits become available in
the covert resource and when they need to be replaced. Hence, even with pure storage
channels, there is the element of timing. A covert timing channel works by modulating the
time at which something occurs. Thus, the table entry or the something itself becomes the
shared resource visible to the two cooperating processes form which the covert channel is
built.
Part B : 20 Marks
1. Research the TJX data breach case on the web and answer the following questions.
COMPUTER SECURITY
a. Was the TJX break-in due to a single security weakness or multiple security
weaknesses? Explain.
The TJX data breach was as a result of a combination of multiple vulnerabilities that
were exploited in their systems and processes. The encryption used for the security of data
was WEP. This encryption was used to encrypt debit and credit cards, cheques and other
electronic merchandise. It was determined that the attackers easily decrypted these data using
decryption tools and obtained the data through skimming. The systems also had
poorlysecured in-store computer kiosks that enabled direct access to the IT main systems as
users could easily upload requests to the jobs database and make their applications. This
clearly was a firewall issue that was not properly configured to keep the systems secure from
direct access from the malicious attackers. There was also a poorly configured WI-FI
network where endpoint devices were used to decode data streaming which resulted to the
hacking of the central database through the wireless connection. Also, the employees at TJX
were not vigilant and strict enough to make sure that they prevent unauthorized access to
terminals where the data thieves swapped the store’s PIN-pad terminal multiple times using
devices that were used to capture customers’ account numbers and PIN. Later they returned
b. Suggest a set of measures which probably would have prevented the TJX data
Some changes should be enforced to prevent the TJX data breach. These include:
Replacing the existing WEP security with a WPA encryption that offers better security. Also,
the terminal systems should not save the customer data stored on the magnetic strip. Also, all
the USB access in all in-store kiosks should be disabled so that no user can run malicious
applications from these devices. They should also configure a strong firewall system that will
COMPUTER SECURITY
protect the systems form malicious entries from untrusted sites. They should also test their
ecommerce systems that should be fixed to ensure they are not susceptible to SQL injections.
Their software system should also be updated to patch any vulnerabilities that are identified.
They should also hire penetration testers who can be able to use advanced skills to identify
vulnerabilities in their system. The team of the security testers will report on any loopholes
they find on these systems. Finally, they should upgrade their POS systems to use “Chip-and
PIN” technology for all the cards in use, which will provide more security.
c. Which of the CIA goals did TJX fail to achieve in this attack?
TJX failed to provide system logs that would have been useful to perform a forensics
audit to identify the exact transactions that took place, their time and date of the transaction,
and the locations that these transactions took place. For all systems, the logs play an
important role in determining the specifics of an attack which was not possible with TJX