Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Imagine that you have recently joined a university as a central information security analyst. On a busy Wednesday morning, your supervisor tells you that a
Imagine that you have recently joined a university as a central information security analyst. On a busy Wednesday morning, your supervisor tells you that a significant vulnerability has been discovered in the universitys cryptosystem. Since this is a serious matter, he wants you to do some research and come up with a list of things that the university should do to handle the situation. When you inquire about the vulnerability, he points to the following URLs:
http:technetmicrosoft.comenussecurityadvisory
http:wwwwin.tue.nlhashclashrogueca
http:wwwkbcert.orgvulsid
http:wwwcisco.comenUSproductscsrciscosrmdhtml
You are a bit unsure about how your university uses the cryptosystem, so he explains that the university uses MessageDigest algorithm MD in a wide variety of areas. These include hashing to check for file integrity of downloaded files, as well as MD hashes that the university provides for its own files that it makes available for download, MD basedsigning certificates from the university's internal Certificate Authority. In addition, the university uses a Cisco ASA firewall device which can create and sign digital certificates for users and systems. These ASAs use MD by default, and the university has used the ASAs to create certificates for critical systems in some departments.
With these considerations in mind, you are required to submit a report on the threat the university faces and what response it would require from your institution. Briefly explain what the university should do about the vulnerability, and what effect any changes required might have on the institution or its students, employees, graduates, or other populations. The summary should include what the vulnerability is how dangerous it could be what its effects are and how it can be countered or remediated. You should address communication of the issue, such as who would need to be made aware of it and how. Therefore, while writing the summary, consider answering the following questions:
What effect does the vulnerability have on the cryptosystem?
Is the threat significant? What would an exploit of the cryptosystem mean to your organization?
How easy is it to exploit the vulnerability?
Does a tool exist to exploit the vulnerability?
Is the cryptosystem still usable but with caveats, or should it be replaced?
Can your organization easily replace the cryptosystem?
Has an exploit been released?
What is the likelihood of an exploit?
Would attacks be conducted? What would their result be
How widely used is the system?
Would the attacks cause it to be no longer trustworthy?
What information is required for a technical audience?
What information is required for a nontechnical audience?
Required Resources
Access to the Internet
Submission Requirements
Format: Microsoft Word
Font: Arial, Point, DoubleSpace
Citation Style: APA
Length: pages
SelfAssessment Checklist
I have explained what effect the vulnerability has on the usefulness of the cryptosystem and explained why this is significant.
I have explained the effect of the threat in the context of a higher education institution.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started