Answer the following questions from the chapter 1 reading from your textbook. You may work on these questions with one or two other partners, but all students must submit the document individually in their own repositories along with each student's name documented with the submission.
-
Define the term computer security.
-
What is the difference between passive and active security threats?
-
Explain the difference between an attack surface and an attack tree.
-
Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.
-
Repeat question #4 for a telephone switching system that routes calls through a switching network based on the telephone number requested by the caller.
-
List and briefly define the fundamental security design principles.
-
Consider a desktop publishing system used to produce documents for various organizations.
-
Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.
-
Give an example of a type of publication in which data integrity is the most important requirement.
-
Give an example in which system availability is the most important requirement.
-
-
For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.
-
An organization managing public information on its Web server.
-
A law enforcement organization managing extremely sensitive investigative information.
-
A financial organization managing routine administrative information (not privacy-related information).
-
An information system used for large acquisitions in a contracting organization contains both sensitive, pre-solicitation phase contract information and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.
-
A power plant contains a SCADA (supervisory control and data acquisition) system con- trolling the distribution of electric power for a large military installation. The SCADA system contains both real-time sensor data and routine administrative information. Assess the impact for the two data sets separately and the information system as a whole.
-
-
Develop an attack tree for gaining access to the contents of a physical safe.
-
Consider the following general code for allowing access to a resource:
DWORD dwRet = IsAccessAllowed(...); if (dwRet == ERROR_ACCESS_DENIED) { // Security check failed. // Inform user that access is denied. } else { // Security check OK. }
-
Explain the security flaw in this program.
-
Rewrite the code to avoid the flaw (Hint: Consider the design principle of fail-safe defaults).
-
Commit the answers to the questions in a readable file to your git repository by the due date and time indicated with your repository on GitHub Classroom. The only approved file submission format is Markdown. Other formats will only be accepted with explicit approval.
- Your writeup file must be done in Markdown format and must be included in the repository as a separate file. View the file
README.md
for an example of Markdown. - Any included images or screenshots should be done in
*.jpg
,*.png
, or*.gif
formats, and be included individually as files in your repository (i.e. no binary ‘document’ with the images pasted inside). - Screenshots or images may be linked in your Markdown file writeup if you wish to do so.