辅导PDF、讲解Python/Java、CS/C++编程辅导讲解、CS/Java辅导

- 首页 >> 其他

Homework 02

Due Monday, October 08 at 11:59pm

Please submit a PDF on Blackboard with your answers. They must be

typeset with LaTeX, or, if you prefer, Word. This is an individual assignment.

Please include the honor code at the bottom of your answers.

1. Consider a system that uses GitHub to submit homework assignments,

such as used by CSCI-241. Give examples of confidentiality, availability,

and integrity requirements associated with this system. For each, indicate

the degree of importance of that requirement.

2. Still considering the GitHub submission used by CSCI-241, what can you

say about the other 3 goals of security (Authenticity, Anonymity, and

Assurance)? For each, indicate if they apply and why/why not.

3. Reports of computer security failures frequently appear in the daily news.

Cite a recently reported failure that exemplifies one or more of the ”principles”

presented in class (easiest penetration, adequate protection, effectiveness,

weakest link) and explain how it applies. Include a discussion of

what security principles were violated.

4. [G&T R-1.6,1.9,10] With respect to the CIA-AAA concepts, what risks

are posed by:

(a) email spam

(b) a packet sniffer monitoring all traffic at a wireless access point

(c) someone buying songs online, burning a CD of them, ripping that to

MP3s, and then giving all their friends copies of the songs

5. [G&T C-2.2] For safety reasons, external locked doors on commercial

buildings have mechanism that allow people on the inside to escape without

needing a key or combination. One type uses an infrared motion

detector to open an electronic lock for people moving towards the door

from the inside (e.g., grocery store doors). Explain how a gap under such

an external door might be exploited to open the door from the outside.

6. [G&T C-2.3] A group of n pirates has a treasure chest and one unique lock

and key for each pirate. Using hardware that is probably lying around

their ship, they want to protect the chest so that any single pirate can

open the chest using his lock and key. How do they set this up?

1

7. [G &T C-2.14] Consider the following simple protocol intended to allow

an RFID reader to authenticate an RFID tag. The protocol assumes that

the tag can store a 32-bit secret key, s, shared with the reader, perform

XOR (⊕) operations, and receive and transmit via radio 32-bit values.

The reader generates a random 32-bit challenge x and transmits y = x⊕s

to the tag. The tag computes z = y ⊕ s and sends z to the reader. The

reader authenticates the tag if z = x. Show that a passive eavesdropper

that observes a single execution of the protocol can recover key s and

impersonate the tag. What if the tag and reader share to secret keys s1

and s2, the reader sends x ⊕ s1 and the tag responds with x ⊕ s2 after

recovering x?

8. Oberlin College has a wide range of computer and network resources on

campus in a variety of locations (e.g., computer labs, servers, network

closets, wireless access points). Pick one and analyze it in terms of its

physical security. Address this in terms of

(a) Location protection

(b) Physical intrusion detection

(c) Hardware attacks

(d) Eavesdropping

(e) Physical interface attacks

In your opinion, are the measures in place appropriate? What recommendations

would you make to the powers that be to reasonable improve the

physical security?

Based on material created by Benjamin Kuperman.