Information Systems Assignment 3
Information Systems Assignment 3
Information Systems Assignment 3
2100906
ASSIGNMENT 3
QUESTION 1:
EXPLAIN THE KEY PRINCIPLES OF SECURE SYSTEMS DESIGN AND
THEIR IMPORTANCE IN THE CONTEXT OF MODERN INFORMATION
SYSTEMS SECURITY. PROVIDE EXAMPLES TO ILLUSTRATE EACH
PRINCIPLE.
- Secure systems design is an approach that integrates security considerations
throughout the entire development lifecycle.
- The following are principles and their importance in modern information
systems security:
1. Least Privilege: dictates that users and processes should be granted the
minimum level of access rights necessary to perform their intended tasks.
Example: A web server process shouldn't have full administrative access to the
system, it only needs permissions to read files and respond to requests.
Example: The person approving financial transactions shouldn't also be the one
reconciling bank statements.
Importance: Enables security experts to review and identify potential flaws in the
system's security architecture.
Example: Secure protocols like HTTPS publish their specifications allowing for
open analysis and improvement.
8. Psychological Acceptability: Security controls should be designed to be
usable and not overly cumbersome for legitimate users. Complex and
frustrating security measures can lead to workarounds or bypasses.
Importance: Encourages users to adhere to security policies and reduces the risk
of them taking shortcuts that could compromise the system.
Importance: Discourages casual attacks and makes it more likely that attackers
will focus on easier targets.
Example: Using strong password hashing algorithms with high iteration counts
makes it computationally expensive to crack passwords through brute-force
attacks.
QUESTION 2:
Symmetric Encryption:
Asymmetric Encryption:
• Uses a pair of mathematically linked keys: a public key and a private key.
• Public key is widely distributed for encryption, while the private key is kept
secret.
• Slower than symmetric encryption due to complex mathematical operations.
Use Case: Securely sending confidential information. You can publish your public
key for anyone to use for encryption. Only your private key can decrypt the
message, ensuring only you can read it. This is commonly used in digital
signatures and secure file transfer protocols.
QUESTION 3:
IDENTIFY THREE MAJOR THREATS TO NETWORK SECURITY AND
DESCRIBE HOW SPECIFIC NETWORK SECURITY DEVICES OR
TECHNOLOGIES CAN MITIGATE THESE THREATS.
QUESTION 4:
DISCUSS THE ROLE OF CRYPTOGRAPHIC PROTOCOLS IN
SECURING COMMUNICATIONS, AND PROVIDE EXAMPLES OF
SUCH PROTOCOLS USED IN PRACTICE. {10marks}
1. Confidentiality:
o Ensures that data is accessible only to authorized parties.
o Example: Encryption protocols, such as SSL/TLS, encrypt data
transmitted over the internet, preventing eavesdroppers from reading
the content.
2. Integrity:
o Ensures that data has not been altered during transmission.
o Example: Protocols like Hash-based Message Authentication Code
add a cryptographic hash to data, allowing the receiver to verify that
the data has not been tampered with.
3. Authenticity:
o Verifies the identities of the communicating parties.
o Example: SSL/TLS uses certificates issued by trusted Certificate
Authorities to authenticate the identity of websites, ensuring that users
are communicating with legitimate entities.
4. Non-repudiation:
o Ensures that a party cannot deny having sent or received a message.
o Example: Digital signatures provide non-repudiation by allowing the
recipient to prove that a message was indeed sent by the claimed
sender.