Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PLZ ANSWER EVERY QUESTION IN FULL THX WILL GIVE THUMBS UP IF EVERY QUESTION IS ANSWERED CORRECTLY IN FULL THX SO MUCH 1. (25 pts)

PLZ ANSWER EVERY QUESTION IN FULL THX WILL GIVE THUMBS UP IF EVERY QUESTION IS ANSWERED CORRECTLY IN FULL THX SO MUCH
image text in transcribed
1. (25 pts) Consider an intrusion detection system with the following properties. Attack traffic is 0.1 %. The intrusion detection system is 99 % accurate. That is 99 % of the attacks raise an alarm. Assume that a valid packet causes an alarm 1 % of the time. Answer the following questions based on this information. (a) What is the probability that an alarm will be raised for a packet? (b) What is the probability that an alarm corresponds to an attack? (c) What is the probability that an alarm corresponds to a valid packet? 2. (25 pts) A rapidly-growing online crime is phishing, in which victims are lured by an e-mail to log on to a website that appears genuine but that actually steals their passwords. You have been hired by a bank to help them harden their online banking service against phishing attacks. Explain briefly the strengths and weaknesses of the following three possible countermeasures: (a) SSL/TLS client certificates issued to each customer (b) Displaying a unique picture to each customer during the login process: (c) Requiring that large payments, or payments to new recipients, be authorised by telephone or SMS as well as online. 3. (25 pts) VerySafe Ltd offers two vaults with electronic locks. They open only after the correct decimal code has been entered. The VS100,a low-cost civilian model, expects a 6-digit code. After all six digits have been entered, it will either open or will signal that the code was wrong and ask for another try. The VS110, a far more expensive government version, expects a 40-digit code. Users of a beta-test version of the VS110 complained about the difficulty of entering such a long code correctly. The manufacturer therefore made a last-minute modification. After every five digits, the VS110 now either confirms that the code has been entered correctly so far, or it asks for the previous five digits again. Compare the security of the VS100 and VS110. 4. (25 pts) Alice wants to attack Bob's computer via the Internet, by sending IP packets to it, directly from her own computer. She does not want Bob to find out the IP address of her computer. (a) Is this easier to achieve for Alice with TCP or UDP based application protocols? Explain briefly. (b) For the more difficult protocol, explain one technique that Alice could try to overcome this obstacle and one countermeasure that Bob could implement in his computer

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managerial Accounting

Authors: John J. Wild, Ken W. Shaw

2010 Edition

9789813155497, 73379581, 9813155493, 978-0073379586

More Books

Students also viewed these Accounting questions