Answers Ict 3156 Misac1
Answers Ict 3156 Misac1
Answers Ict 3156 Misac1
Method: By method mean the skills, knowledge, tools, and other things with which to
perpetrate the attack. he method refers to the technical and strategic approach employed
by an attacker to exploit vulnerabilities in the authentication system. This could involve
various techniques such as brute force attacks, credential stuffing, phishing, man-in-
the-middle attacks, and more. The choice of method depends on the attacker's technical
skills, resources, and the specific weaknesses of the target authentication system.
Opportunity: is the time and access to execute an attack Many computer systems present
ample opportunity for attack. Systems available to the public are, by definition,
accessible; often their owners take special care to make them fully available so that if
one hardware component fails, the owner has spares instantly ready to be pressed into
service. Other people are oblivious to the need to protect their computers, so unattended
laptops and unsecured network connections give ample opportunity for attack. Some
systems have private or undocumented entry points for administration or maintenance,
but attackers can also find and use those entry points to attack the systems.
Motive: Finally, an attacker must have a motive or reason to want to attack.
Method, opportunity, and motive are all necessary for an attack to succeed; deny any of
these and the attack will fail.
Fingerprint Recognition:
Advantages:
High Accuracy: Fingerprint recognition is known for its accuracy and low false acceptance rate,
making it reliable for authentication.
User Acceptance: It's widely accepted and used in various consumer devices, which may
contribute to higher user acceptance.
Cost: Implementation costs are relatively moderate compared to some other biometric
methods.
Disadvantages:
Hygiene Concerns: Fingerprint scanners may require regular cleaning to maintain accuracy,
which can be challenging in shared corporate environments.
Privacy: Concerns may arise regarding the storage and misuse of fingerprint data.
Spoofing: While modern fingerprint systems are designed to resist spoofing, this remains a
potential vulnerability.
Facial Recognition:
Page 2 of 6
Advantages:
Non-Intrusive: Facial recognition is non-intrusive and does not require physical contact with a
sensor.
User Convenience: Users are familiar with the concept from smartphone and laptop
authentication.
Cost: Implementation can be cost-effective as it often relies on existing camera infrastructure.
Disadvantages:
Accuracy: Facial recognition can be influenced by lighting conditions, angles, and facial changes
over time, potentially leading to lower accuracy.
Privacy: Collecting and storing facial data can raise privacy concerns, especially in corporate
settings.
Vulnerabilities: Facial recognition systems may be vulnerable to spoofing using photos or
videos.
Iris Scanning:
Advantages:
High Accuracy: Iris scanning is highly accurate and offers low false acceptance rates.
Non-Intrusive: Like facial recognition, it's non-intrusive and user-friendly.
Security: Iris patterns are unique and stable, making it difficult to spoof.
Disadvantages:
Cost: Iris scanning systems tend to be more expensive to implement due to specialized
hardware requirements.
User Acceptance: While generally well-accepted, some users may have concerns about their
iris data being collected.
Complexity: The complexity of iris recognition systems may require more significant
integration efforts.
2. In the context of access control and pseudonyms, can you describe a scenario where
allowing users to assign unique names to files within their directories can lead to a
situation where one user may have two different sets of access rights to the same file,
causing potential inconsistencies in permissions?
Suppose, however, that S would like to use a name other than F to make the file’s contents
more apparent. The system could allow S to name F with any name unique to the directory of
S. Then, F from A could be called Q to S. S may have forgotten that Q is F from A, and so S
requests access again from A for F. But by now A may have more trust in S, so A transfers F
with greater rights than before. This action opens up the possibility that one subject, S, may
have two distinct sets of access rights to F, one under the name Q and one under the name F.
In this way, allowing pseudonyms can lead to multiple permissions that are not necessarily
consistent. Thus, the directory approach is probably too simple for most object protection
situations.
1. If you forget your password for a website and you click [Forgot my password], Such
that Compare these two cases in terms of vulnerability of the website owner.
(a)Company sends you a new password by email.
(b) Sends you your old password by email.
might allow an attacker who gains access to the user's email account to easily reset the
password and gain control of the account.
2. In the context of access control and networked systems, explain the complexities and
challenges that arise when an owner, like A, wishes to revoke access rights to a file (F)
that has been shared with multiple users, especially in scenarios where user B might
have passed these access rights to another user, C. How does the size and structure of
the networked system make this problem even more difficult?
If owner A has passed to user B the right to read file F, an entry for F is made in the directory
for B. This granting of access implies a level of trust between A and B. If A later questions that
trust, A may want to revoke the access right of B. The operating system can respond easily to
the single request to delete the right of B to access F, because that action involves deleting
one entry from a specific directory. But if A wants to remove the rights of everyone to access
F, the operating system must search each individual directory for the entry F, an activity that
can be time consuming on a large system. For example, large systems or networks of smaller
systems can easily have 5,000 to 10,000 active accounts. Moreover, B may have passed the
access right for F to another user C, a situation known as propagation of access rights, so A
may not know that C’s access exists and should be revoked. This problem is particularly serious
in a network.
1. The financial institution is planning to implement a new system that allows clients to
securely communicate and exchange financial documents with their account managers.
Page 5 of 6
They want to ensure that only authorized individuals can access and transmit this
confidential information. Additionally, they want to protect the data from interception
and unauthorized modifications during transmission.
Based on the provided scenario and the technical controls, analyse how the financial
institution can effectively ensure the security of client communication and document
exchange. Address the following points in your response:
(a) Explain how end-to-end encryption works and how it safeguards data during
transmission.
(b)Discuss the benefits of Multi-Factor Authentication (MFA) and its significance in
preventing unauthorized access. Provide examples of possible authentication
factors.
(a) End-to-end encryption is a security measure that ensures that data is encrypted
on the sender's side and remains encrypted until it reaches the intended recipient, where
it is decrypted. This process prevents unauthorized parties, including service providers
and attackers, from accessing the data in its readable form during transmission. Here's
how it works:
Encryption: When a client sends financial documents or messages, the data is
encrypted on their device using a strong encryption algorithm and a unique encryption
key.
Transmission: The encrypted data is transmitted over the network to the financial
institution's servers. Even if intercepted, the encrypted data remains unreadable without
the decryption key.
Decryption: Upon reaching the account manager, the encrypted data is decrypted using
the corresponding decryption key, which is only possessed by the authorized recipient.
The data is then accessible in its original form.
End-to-end encryption safeguards data from interception and unauthorized
modifications during transmission. Even if a malicious actor gains access to the
communication channel, they would only see encrypted data that is computationally
infeasible to decrypt without the proper keys.
2. Provide an overview of the DES algorithm, including its fundamental building blocks,
the number of cycles it uses, and the key length. Explain how DES combines
substitution and transposition techniques to achieve its security. Additionally, describe
the suitability of DES for implementation in software and single-purpose hardware
chips.