Question
Hello, I was looking for a little help with filling out this chart for practicing for an exam. I'm supposed to put an intrusion, security
Hello, I was looking for a little help with filling out this chart for practicing for an exam.
I'm supposed to put an intrusion, security goal violated, and the justification for why I chose the specified Intrusion and Security goal for each situation.
These are the intrusions available:
Interruption, Interception, Modification, Fabrication, and Invasion
These are the Security Goals available:
Confidentially, Integrity, Authentication, non-repudiation, Access control, and availability
The first one is an example and the next few are ones I attempted.
Intrusion(s) Security Goal(s) violated Availability Scenario Justification Bob crashes Alice'sInterruption computer system by sending a flood of packets This is a classic case of DoS attack and hence falls under the category of interruption. Alice':s computer is unavailable for her use and hence the security goal violated is Availability. Another classic case of DoS and hence falls under the category of interception. Alice copies Bob's by evading into the network which is a violation of access control and availabilit Bob copying Alice's assignment by accessing her hard drive is modification and her is violating his own integrity Alice changes the amount on Bob's cheque when it is being transmitted Alice copies Bob's assignment by eavesdropping on traffic from his machine. Access Control & Availability Interception Bob copies Alice's assignment by accessing her hard drive. Modification Integrity Alice changes the amount on Bob's cheque when it is being transmitted. Modification Confidentially through modification as her confidentiality is being infiltrated. This is modification and invading Bob's confidentiality. Bob sends a property deed to the Registrar in the name of Alice by forging Alice's signature. Alice spoof's Bob's IP address to gain access to his office server. Bob installs malware on Alice's computer. Bob obtains Alice's credit card information online and has the credit card company replace it with another card bearing a different account number. Alice has a fake third party authenticate her server as legitimateStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started