Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

ADVANCED E-SECURITY ASSIGNMENT

Please answer the following questions-

QUESTIONS-

1. This question is about the public key used in web site encryption.  The key is called a "digital certificate".  Web sites with encryption start with https not http.

a. Find a company that issues digital certificates. 

One way is to go to your favorite encrypted web site, and click on the padlock symbol.  This will tell you the name of the company that issued the digital certificate for the web site. 

1478_Figure.png

Alternatively, you could just pick a company from the list of recognized digital certificates for the Mozilla web browser.

Either way, find the name of a company that issues digital certificates for web sites.

b. Go to the web site of that company that issues digital certificates.  Look up their contact details, and write down the company's street address and phone number.

c. Browse their web site, and find how much does it cost for a digital certificate for a year?  (Use the cheapest choice, e.g., single-name certificate).

d. How does someone apply for a digital certificate from this company? Do they ask for a driver's licence?  An incorporation certificate?  Or do they only ask that you generate a CSR (certificate signing request), which a web server program can make using its domain name.

e. In your opinion, could a criminal obtain a digital certificate from this company? Why or why not?                                                                          

2. A few short questions about computer security.

a. Anti-virus software is popular for Microsoft Windows. Find the typical detection rate for popular anti-virus software. Please give recent references for what you find (i.e., since 2017 began, or as new as possible)

b. Using the web, find out one recently severe DDoS attack. Who and how did they launch the attack? What damages?

c. How big is the biggest botnet currently in use?  What country is it likely to have come from?   Please give references for what you find.

Note that the BredoLab Botnet (also known as Oficla) used to run on about thirty million computers, but it was mostly dismantled back in 2010.

3. For identity theft events, see website privacyrights

1451_Figure2.png

a. Limit the search to only 2017.  What is the biggest (i.e., most identities stolen) identity theft incident that has happened so far in 2017?  Briefly describe the date, the organization, how many people were affected, and what happened.          

b. Tick all the boxes to search to all organization types, and limit the search to only the type "Hacking or malware (HACK)".  What is the biggest (i.e., most identities stolen) identity theft incident that has happened so far in 2017? 

If this turns out to be the same answer as for (a) above, then pick the second-biggest theft in the hacking category.

Briefly describe the date, the organization, how many people were affected, and what happened.

4. Some fun questions about criminal web sites.

a. Go look up a list of recently-registered domain names. Click on a recent day, to see all the web domain names that were registered on that day. 

Using this or any similar web site, pick a recent day in 2017.  What day did you check, and roughly how many domain names were registered? (Rounding is okay)

b. From those domains, randomly choose 5 domain names.  Copy-and-paste the domain name into your web browser, to see if there is a web site there.

How many of those 5 domains have a web site already set up?  How many of them go nowhere, or redirect to a domain registry?

c. Pick one recently registered domain. Use the whois search to look up the domain name.

What is the name of the contact person?  It should be listed as "Registrant Name"?  Is there a phone number, email address, or physical address?  Write down as much information about?

d. Either run a traceroute program on your computer, or go to a web site with a traceroute interface (look for one on Google).  A visual traceroute program is nice.

Using traceroute, can you find in which country (and, if you can figure it out, which city) is the web site physically hosted?

e. Does the web site itself have any contact details, like phone number or address?  If so, find what city the phone number is in.

5. Cost-benefit analysis!  Your company's web site is sometimes broken into by hackers, with the following estimates of probabilities and costs:

  • Each day there is a 1% chance (once in a hundred days) that a script kiddie will merely deface the web site but cause no other damage, costing only $2,000 in lost sales.
  • Each day there is a 0.25% chance (once in four hundred days) that an expert hacker will delete data and steal customers' credit card numbers, costing $800,000.
  • Remember how hackers stole all the data from Ashley Madison and killed the company? We estimate that each day there is a 0.01% chance (once in ten thousand days) that an expert hacker will steal all the company's data and kill it, costing $5,000,000.

The big boss wants you to advise on which of these three solutions to buy:

I. We could do nothing and accept the problem.

II. A nice IBM firewall costs a huge $300,000 per year.  It claims to prevent all script kiddie hackers and 97% of expert hackers.

III. A cheap Microsoft firewall costs only $50,000 per year.  It claims to prevent 90% of script kiddie hackers and 50% of expert hackers.

The big boss wants you to advise which to choose.  Feel free to use a spreadsheet or calculator or whatever you find the most convenient to answer these questions:

  • Calculate the annualized loss expectancy (ALE) for the three kinds of hacker attacks. What is the total annual loss expectancy?
  • For the three possible solutions, calculate the total annualized loss expectancy (ALE) if that solution was used?
  • Calculate the cost-benefit of the three different solutions.
  • If the boss asks, is there a large difference between the solutions (are two solutions about the same), or is there a clear winner?
  • A magazine article claims that the IBM firewall doesn't stop 97% of expert hackers, it only stops 95% of expert hackers. Would this small difference cause you to change your advice?
  • The Microsoft salesperson offers to reduce the price from $50,000 to only $30,000 per year. Would this change your advice?

6. The following table contains a set of packet filter firewall rules for an IP network ranging from 192.168.1.0 to 192.168.1.254. In this network,

  • The router that connects to the outside world has two network connections, and the one on the internal side is 192.168.1.1
  • The email server (Simple Mail Transfer Protocol = SMTP) is at 192.168.1.2
  • The web server (Hyper Text Transfer Protocol = HTTP) is at 192.168.1.3
  • Only computers on our local network should be able to contact the web proxy server, which is at 192.168.1.4 and listens on port 8080.

(a) Briefly explain the effect of each of the following rules.  Remember that in this context, 192.168.1.0   =  192.168.1.* =  any local address.

 

Source

Address

Source

Port

Destination Address

Destination

Port

Action

1

Any

Any

192.168.1.0

> 1023

Allow

2

192.168.1.1

Any

Any

Any

Deny

3

Any

Any

192.168.1.1

Any

Deny

4

192.168.1.0

Any

Any

Any

Allow

5

Any

Any

192.168.1.2

SMTP = 25

Allow

6

Any

Any

192.168.1.3

HTTP = 80

Allow

7

192.168.1.0

Any

192.168.1.4

HTTP_ALT = 8080

Allow

8

Any

Any

Any

Any

Deny

(b) Your web proxy server is at 192.168.1.4 and listens on port 8080.  An outside computer at 123.18.243.3 attempts to open a connection from port 5150 to your web proxy server.  Typical packets are below:

Will the outside computer be able to connect?  Give details.

Packet

Direction

Source Address

Dest. Address

Protocol

Dest. Port

Action

1

In

123.18.243.3

192.168.1.4

TCP

8080

?

2

Out

192.168.1.4

123.18.243.3

TCP

5150

?

(c) To provide more protection, two new rules (labeled 0a and 0b) are added at the start, so the rules look like the table below.  Will the outside computer at 123.18.243.3 be able to connect from client port 5050 to the web proxy server now?  Why or why not?

 

Source

Address

Source

Port

Destination Address

Destination

Port

Action

0a

192.168.1.0

Any

192.168.1.4

HTTP_ALT = 8080

Allow

0b

Any

Any

192.168.1.4

Any

Deny

1

Any

Any

192.168.1.0

> 1023

Allow

2

192.168.1.1

Any

Any

Any

Deny

3

Any

Any

192.168.1.1

Any

Deny

4

192.168.1.0

Any

Any

Any

Allow

5

Any

Any

192.168.1.2

SMTP = 25

Allow

6

Any

Any

192.168.1.3

HTTP = 80

Allow

7

192.168.1.0

Any

192.168.1.4

HTTP_ALT = 8080

Allow

8

Any

Any

Any

Any

Deny

(d) The outside computer now sends packets from client port 25 to the web proxy server's port 8080.  Will the outside computer be able to connect?  Give details.

Packet

Direction

Source Address

Dest. Address

Protocol

Dest. Port

Action

1

In

123.18.243.3

192.168.1.4

TCP

8080

?

2

Out

192.168.1.4

123.18.243.3

TCP

25

?

(e) If we replaced rule 0a with rule 4, would that change anything?  That is, will this set of rules work the same as the rules in part (d)?

 

Source

Address

Source

Port

Destination Address

Destination Port

Action

4

192.168.1.0

Any

Any

Any

Allow

0b

Any

Any

192.168.1.4

Any

Deny

1

Any

Any

192.168.1.0

> 1023

Allow

2

192.168.1.1

Any

Any

Any

Deny

3

Any

Any

192.168.1.1

Any

Deny

5

Any

Any

192.168.1.2

SMTP = 25

Allow

6

Any

Any

192.168.1.3

HTTP = 80

Allow

7

192.168.1.0

Any

192.168.1.4

HTTP_ALT = 8080

Allow

8

Any

Any

Any

Any

Deny

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92300397
  • Price:- $140

Guranteed 48 Hours Delivery, In Price:- $140

Have any Question?


Related Questions in Computer Network & Security

Topic is impacts of data breaches the report will divide in

Topic is "Impacts of data breaches". the report will divide in to 5 section which is : "" 1-Abstract: comprehensive overview of the report in 150 to 200 words. 2- Introduction: Describe the topic and its issue in 250 to ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

Question in a short paragraph explain the transmission of

Question : In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one pa ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

Assignment -need project made by packet truce follow the

Assignment - Need project made by packet Truce. Follow the given report and please don't make the project big and video will describe full project in details and with configuration. Project - Design and Implementation of ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As