IS Assignment 2
IS Assignment 2
1. We are exploring the possibility of an on-line final exam for CSC4291. Please describe
some of the security issues that this raises. Your task is not to come up with a security design
for such an exam, but to enumerate issues that would need to be explored in order to come
up with the requirements and design. Think in terms of the terminology and concepts we
introduced in the first two lectures.
Your write up should be approximately one page typeset. Not more than one page.
Instantiation of rights: Adding a given right more than once for a given (subject, object) pair is
idempotent.
A process (subject) can create an object if and only if there is a "create" right in a[process,
process].
The initial ACM (access control matrix) A is:
Show how ACLs and C-Lists are derived from an access control matrix given below
SOLUTION:
file1 KP UP1 UP2
(Kernel Process) (User Process 1) (User Process 2)
UP2 delete,
execute, read,
update
Command Create_Object(process, file)
create object file;
enter own into a[process, file];
enter delete into a[process, file];
enter read into a[process, file];
enter update into a[process, file];
end
(b) Write ACM program using HRU syntax with mono-condition that allows a user process to
delete a file that is owned by the same process.
Solution sketch:
Command Destroy_file(file)
if file in Objects
then
destroy object file;
end
3. Explain the vulnerabilities and suggested mitigations associated with wireless
networking. ( you are required to select a recent paper (within the last five years) related
with this topic
Email addresses, usernames, names, cities of residence, and salted and hashed with
passwords
Is there an explanation, or any theories about how this information was stolen?
Malicious individuals gained access to the encrypted password data and made that
information available on the internet. In that time, it appears that they have been using
their resources to try and crack those passwords.
Is there information and/or theories about who stole this data, or what their motivations
may have been?
No such details
What kind of privacy impact does the stolen data have for individuals who trusted this
organization with information?
The organization contacted ZDNet to boast about the incident, saying that Canva had
detected their attack and closed their data breach server.
The company confirmed the incident and subsequently notified users, prompted
them to change passwords, and reset OAuth tokens.
Are there examples of individuals who have experienced negative effects (consequences)
from having their data stolen?
The first response was to lock down Canva, then notify authorities and users that the
breach had occurred. Because the intruder was interrupted mid-attack, they also took a
different tactic to most security incidents and tweeted about the attack, which required
a rapid communication response.
What are some prevailing opinions presented in the media regarding the organization
affected, the data stolen and the individual?
Affected users will be required to set a new password to continue using Canva. Please
note that if your password has been reset, it does not mean that your account has been
accessed by attackers. We are taking this precaution to protect your Canva account.
Create hard to guess passwords with a combination of letters (upper and lower case,
numbers and special characters).
Use a password manager to manage all your Internet passwords.
Make sure you use a safe and secure password that has not been used on other sites
or accounts before.