I (30)

 

 

II (40)

 

 

III (30)

 

 

Bonus (5)

 

 

Total

 

 

 Test 2

2015 – CSCE 201

Name:

 

Answer the following questions.  Be brief and precise!

 

I. 30 points

1.     (10) Recommend 3 activities to secure your web browser:

 

 

 

 

 

 

 

 

 

            Can cookies represent a threat to web browser security?

 

 

 

 

 

 

 

 

 

2.    (20) Assume you have been hired by the CSE department to establish an Access Control specification for the computer labs.  Describe the advantages and disadvantages of using Discretionary Access Control (DAC) or Role-Based Access Control (RBAC) to implement your policy.  Give a sample specification of access permission for each.

 

DAC:

 

 

 

 

 

 

Sample specification:

 

 

RBAC:

 

 

 

 

 

 

 

 

 

 

Sample specification:

 


II. 40 points  Short answers

1.      (20)  What is the main aim of Denial of Service attacks?

 

 

 

 

 

 

 

 

 

Briefly describe how the Ping-of-Death attack achieves this aim.

 

 

 

 

 

 

 

 

 

 

2.      (20) Briefly explain how secret (symmetric) key encryption supports

·         Confidentiality

 

 

 

·         Integrity

 

 

 

·         Availability

 

 

 

 

·         Authenticity

 

 

 

What is the key distribution problem of symmetric key encryption?

 

 

 

 


III.       30 points Exercises

1.      (20)  Assume Bob and Alice decide to establish a new secret key to be used for secure communication in a following way.  

 

 

Alice and Bob agree on a large number securely, e.g., 999,999 before the communication.    That is, only Bob and Alice know that the number they wanted to use is 999,999. 

 

Bob → Alice: B= 999,999 + sum(Bob’s birthday)    

Note: sum of a birthday is calculated by adding the values for day, month, and year.  E.g.,  sum of June 15, 2002 is 6+15+2002= 2023.

 

Alice → Bob:  A= 999,999 + sum(Alice’s birthday)  

 

Alice calculates the key by : B + sum(Alice’s birthday)

Bob calculates the key by : A + sum(Bob’s birthday)

 

           

     Would this method allow Bob and Alice to agree on a key secretly?  Show the key value using the following birthdays:

            Bob:  July 22, 1978

            Alice: May 24, 1981

 

 

 

 

 

 

 

Show a malicious attack against the protocol where the attacker will know the secret key.

 

 

 

 

 

 

 

2.      (10)  Briefly explain what is a misuse (abuse) case during software development. 

 

 

 

 

 

Assume you are developing an application for a mobile device that allows parents track the GPS location of their children’s phone.  Show an malicious attack (misuse case) against the application. 

 

 


Bonus question (5 points)

Briefly explain why web browser based attacks are serious.