Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Hello, I was looking for a little help with filling out this chart for practicing for an exam. I'm supposed to put an intrusion, security

Hello, I was looking for a little help with filling out this chart for practicing for an exam.

I'm supposed to put an intrusion, security goal violated, and the justification for why I chose the specified Intrusion and Security goal for each situation.

These are the intrusions available:

Interruption, Interception, Modification, Fabrication, and Invasion

These are the Security Goals available:

Confidentially, Integrity, Authentication, non-repudiation, Access control, and availability

The first one is an example and the next few are ones I attempted.

image text in transcribedimage text in transcribed

Intrusion(s) Security Goal(s) violated Availability Scenario Justification Bob crashes Alice'sInterruption computer system by sending a flood of packets This is a classic case of DoS attack and hence falls under the category of interruption. Alice':s computer is unavailable for her use and hence the security goal violated is Availability. Another classic case of DoS and hence falls under the category of interception. Alice copies Bob's by evading into the network which is a violation of access control and availabilit Bob copying Alice's assignment by accessing her hard drive is modification and her is violating his own integrity Alice changes the amount on Bob's cheque when it is being transmitted Alice copies Bob's assignment by eavesdropping on traffic from his machine. Access Control & Availability Interception Bob copies Alice's assignment by accessing her hard drive. Modification Integrity Alice changes the amount on Bob's cheque when it is being transmitted. Modification Confidentially through modification as her confidentiality is being infiltrated. This is modification and invading Bob's confidentiality. Bob sends a property deed to the Registrar in the name of Alice by forging Alice's signature. Alice spoof's Bob's IP address to gain access to his office server. Bob installs malware on Alice's computer. Bob obtains Alice's credit card information online and has the credit card company replace it with another card bearing a different account number. Alice has a fake third party authenticate her server as legitimate

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems On GPUs In Databases

Authors: Johns Paul ,Shengliang Lu ,Bingsheng He

1st Edition

1680838482, 978-1680838480

More Books

Students also viewed these Databases questions

Question

5. How can I help others in the network achieve their goals?

Answered: 1 week ago