Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment

The SmurfWare SmurfScanner is a new biometric authentication device to keep non-Smurfs out of the Smurfland network. The biometric device is being dubbed the SmurfScanner by Papa Smurf. The SmurfScanner is a hardware device that scans a user's skin color for blueness.

Since only Smurfs have that unique Saturday morning cartoon blue color, if the device can successfully identify the unique blue, then this will do for making a determination as to whether or not a person really is a Smurf (or at least we make this assumption for the purposes of this exercise, be based in actual fact or not). The SmurfScanner is attached to a PC running MicroSmurf Windoze X via serial port. Along with an all-blue user manual and a blue SmurfWare coffee mug, the SmurfScanner comes with software that allows it to act as the login screen manager in Windoze.

To even get to the login screen, a user's Smurfness has to be established by the SmurfScanner. Once calibrated by the manager application, the SmurfScanner returns whether or not a user is sufficiently blue. SmurfScanner Architecture Component Description Smurfscanner Crypto Helper: Since actual authentication traffic between the scanner and the software has to be encrypted and integrity has to be ensured, the software package provides an API for making encrypted calls, such as IsUserASmurf(), to the SmurfScanner.

The caller gets to decide whether to use the proprietary but extensively tested (by two Smurf crypto experts) SmurfCrypto library or the equally solid MicroSmurf Windoze implementation of crypto. The Helper exists in both the PC and the SmurfScanner hardware to facilitate two-way integrity and privacy.

SmurfScanner Common Command Layer: The SmurfScanner formats higher-level API calls into a format that the serial driver can understand, be they encrypted or not. SmurfScanner Manager: Since this application is rarely used, crypto was deemed unnecessary.

Instead, the Smurfs hard-coded a hash of Smurfette's body weight in milligrams in both the SmurfScanner and the Embedded I/O Manager so that the SmurfScanner's Embedded I/O Manager would recognize that the privileged commands were coming from only the SmurfScanner Manager application. The Manager application appends this hash to every command sent to the scanner. The Smurfs chose this secret method because Smurfette's body weight is a well-known fact with the entire Smurf community but not known at all outside of it.

The Manager application is used to set up the scanner's calibration and to run diagnostics in case it is malfunctioning. The scanner must be calibrated for local light conditions with a sample of Smurf before use. The Manager is also used to initialize the Helper apps on both the PC and the scanner with secrets to allow the integrity and privacy functionality to work.

The secrets are a hash of the system clock. SmurfScanner Embedded I/O Manager: This app sorts encrypted versus unencrypted commands and forwards them to either the Helper or directly to the Logic Layer. Commands are sent directly to the Logic Layer when the I/O Manager recognizes the Smurfette body weight shared secret hash. SmurfScanner Logic Layer: This layer takes the hardware measurement of the user's blueness and compares it to the calibrated value and returns a yes or no, thus performing authentication on a Smurf.

The Logic Layer also does other things like calibrate the scanner based on data received from the Manager app, track usage, and run diagnostics. SmurfScanner Business Application: It is critical to understand the business context in order to estimate impact (in such a way as to answer the "Who Cares?" question). In this case, the SmurfScanner is being used to protect SmurfTunes from use by non-Smurfs. SmurfTunes is set up to deliver Saturday morning cartoon theme songs to SmurfPod personal digital listening devices.

Based on the SmurfWare SmurfScanner description, identify five security threats (types of attacks) that are applicable and provide insight into the vulnerabilities that the threats pose to the SmurfWare SmurfScanner.

Finally, list two security controls (safeguards/ countermeasures) for each threat as it applies to this project.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93120397

Have any Question?


Related Questions in Computer Engineering

Question suppose that you have a set of n files that have

Question : Suppose that you have a set of n files that have to be copied on 1GB USB drives. You can assume that the file sizes are known and always less than or equal to 1GB. The objective is to use the minimum possible ...

Assignment week 1 project plan drafta project plan is a

Assignment: Week 1 Project Plan Draft A project plan is a document created at the beginning of the project lifecycle that gives stakeholders and everyone else involved in a project a clear idea of what a project will ent ...

A survey is taken of people in the class of favorite flavor

A survey is taken of people in the class of favorite flavor of ice cream among a forced choice of chocolate, vanilla, or strawberry. 70% prefer chocolate, 20% prefer vanilla, and 10% prefer strawberry. a) What is the ent ...

Question responsive frameworks and libraries provide

Question : Responsive frameworks and libraries provide convenience when creating a modern website. Discuss at least three design options, such as hiding content or layout changes, that would be beneficial for a responsiv ...

Generate a c program for fibonacci function using

Generate a C++ program for Fibonacci function using Stack Fibonacci function Fib(n) is given below. Fib(n)= Fib(n-1) + Fib(n-2) for n > 1 Fib(n)= 1 for n=1 Fib(n)= 0 for n=0 Using following initialization unsigned int *F ...

Short answer1 describe best case average case and worst

SHORT ANSWER 1. Describe best case, average case, and worst case in terms of Big O Notation. When implementing algorithms or data structures which two "Big O cases" are most important to consider and why? 2. Compare and ...

Several of the cameras in the lab can capture a greyscale

Several of the cameras in the lab can capture a greyscale image either as an 8 bit image, or as a 12 bit image. What would be the difference between them, and what would be the benefit of using one over the other? What w ...

A federal agency responsible for enforcing laws governing

A federal agency responsible for enforcing laws governing weights and measures routinely inspect packages to determine whether the weight of the content is at least as great as that advertised on the package. A random sa ...

System analysis and designgo to the scr intranet pageto

SYSTEM ANALYSIS AND DESIGN Go to the SCR Intranet page! To enter, please use the following credentials: Then go to Session 5-Data and Process Modeling Look at the Inbox THE the todo-list and answer all the following 1. J ...

The rate of inflation in year 1 is expected to be 14 year

The rate of inflation in year 1 is expected to be 1.4%, year two is 1.8%, and years three through five is expected to be 2%. Assume the real risk-free rate, r*, is 3% for all maturities. What should the yield to maturity ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As