Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Imagine that you have recently joined a university as a central information security analyst. On a busy Wednesday morning, your supervisor tells you that a

Imagine that you have recently joined a university as a central information security analyst. On a busy Wednesday morning, your supervisor tells you that a significant vulnerability has been discovered in the universitys cryptosystem. Since this is a serious matter, he wants you to do some research and come up with a list of things that the university should do to handle the situation. When you inquire about the vulnerability, he points to the following URLs:
http://technet.microsoft.com/en-us/security/advisory/961509
http://www.win.tue.nl/hashclash/rogue-ca/
http://www.kb.cert.org/vuls/id/836068
http://www.cisco.com/en/US/products/csr/cisco-sr-20090115-md5.html
You are a bit unsure about how your university uses the cryptosystem, so he explains that the university uses Message-Digest algorithm 5(MD5) in a wide variety of areas. These include hashing to check for file integrity of downloaded files, as well as MD5 hashes that the university provides for its own files that it makes available for download, MD5 based-signing certificates from the university's internal Certificate Authority. In addition, the university uses a Cisco ASA firewall device which can create and sign digital certificates for users and systems. These ASAs use MD5 by default, and the university has used the ASAs to create certificates for critical systems in some departments.
With these considerations in mind, you are required to submit a report on the threat the university faces and what response it would require from your institution. Briefly explain what the university should do about the vulnerability, and what effect any changes required might have on the institution or its students, employees, graduates, or other populations. The summary should include what the vulnerability is, how dangerous it could be, what its effects are and how it can be countered or remediated. You should address communication of the issue, such as who would need to be made aware of it and how. Therefore, while writing the summary, consider answering the following questions:
What effect does the vulnerability have on the cryptosystem?
Is the threat significant? What would an exploit of the cryptosystem mean to your organization?
How easy is it to exploit the vulnerability?
Does a tool exist to exploit the vulnerability?
Is the cryptosystem still usable but with caveats, or should it be replaced?
Can your organization easily replace the cryptosystem?
Has an exploit been released?
What is the likelihood of an exploit?
Would attacks be conducted? What would their result be?
How widely used is the system?
Would the attacks cause it to be no longer trustworthy?
What information is required for a technical audience?
What information is required for a nontechnical audience?
Required Resources
Access to the Internet
Submission Requirements
Format: Microsoft Word
Font: Arial, 12-Point, Double-Space
Citation Style: APA
Length: 12 pages
Self-Assessment Checklist
I have explained what effect the vulnerability has on the usefulness of the cryptosystem and explained why this is significant.
I have explained the effect of the threat in the context of a higher education institution.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database In Depth Relational Theory For Practitioners

Authors: C.J. Date

1st Edition

0596100124, 978-0596100124

More Books

Students also viewed these Databases questions

Question

Explain the purpose of a business plan.

Answered: 1 week ago

Question

Define marketing.

Answered: 1 week ago

Question

What are the traditional marketing concepts? Explain.

Answered: 1 week ago

Question

Define Conventional Marketing.

Answered: 1 week ago

Question

Define Synchro Marketing.

Answered: 1 week ago

Question

What is the basis for Security Concerns in Cloud Computing?

Answered: 1 week ago

Question

Describe the three main Cloud Computing Environments.

Answered: 1 week ago