Sunteți pe pagina 1din 8

ASSIGNMENT

OF

CSE-213

SUBMITTED TO- SUBMITTED BY-

LEC. BIKRAMJEET SINGH

ROLLNO-
B.C.A-
1. Que: A Password may become known to other users in a variety of ways. Is there a
simple method for detecting that such an event has occurred? Explain your answer.

Ans: A system and method for monitoring tamper events in a computer system in
accordance with the present invention is disclosed. The system comprises a detector
means for detecting at least one tamper event and for providing an indication when the
tamper event has occurred for longer than a predetermined time period. The system
also includes an adapter means coupled to the detector means for receiving the
indication and for disabling the computer system. The present invention is directed to a
computer system, which has the ability to functionally determine if a tamper event is
authorized and therefore allows the computer to operate after such an event. In a
preferred embodiment, the tamper event could be as simple as a toggle switch being
activated when the cover of the personal computer is removed.

2.Que:What is the purpose of using a “salt” along with the user-provided password?
Where should the “salt” be stored, and how should it be used?

Ans:Salt data complicates dictionary attacks that use pre-encryption of dictionary


entries: each bit of salt used doubles the amount of storage and computation required.

For best security, the salt value is kept secret, separate from the database. This
provides an advantage when a password database is stolen, but the salt is not. To
determine a password from a stolen hash, an attacker cannot simply try common
passwords (such as English language words or names). Rather, they must calculate the
hashes of random characters (at least for the portion of the input they know is the salt),
which is much slower.

In some protocols, the salt is transmitted as cleartext with the encrypted data,
sometimes along with the number of iterations used in generating the key (for key
strengthening). Cryptographic protocols that use salts include SSL and Ciphersaber.

Early Unix systems used a 12-bit salt, but modern implementations use larger values.

Salt is closely related to the concept of nonce.

Assume a user’s secret key is stolen and he is known to use one of 200,000 English
words as his password. The system uses a 32-bit salt. The salted key is now the
original password appended to this random 32-bit salt. Because of this salt, the
attacker’s pre-calculated hashes are of no value. He must calculate the hash of each
word with each of 232 (4,294,967,296) possible salts appended until a match is found.
The total number of possible inputs can be obtained by multiplying the number of words
in the dictionary with the number of possible salts:
To complete a brute-force attack, the attacker must now compute about 800 trillion
hashes, instead of only 200,000. Even though the password itself is known to be simple,
the secret salt makes breaking the password radically more difficult.

3.Que: Discuss a means by which managers of systems connected to the internet could
have designed their systems to limit or eliminate the damage done by a worm. What are
the drawbacks of making the change that you suggest?

Ans: The end result should not be surprising. We don’t have “real” security that
guarantees to stop bad things from happening, and the main reason is that people don’t
buy it. They don’t buy it because the danger is small, and because security is a pain.

• Since the danger is small, people prefer to buy features. A secure system has
fewer features because it has to be implemented correctly. This means that it takes
more time to build, so naturally it lacks the latest features.
• Security is a pain because it stops you from doing things, and you have to do
work to authenticate yourself and to set it up.
A secondary reason we don’t have “real” security is that systems are complicated, and
therefore both the code and the setup have bugs that an attacker can exploit. This is the
reason that gets all the attention, but it is not the heart of the problem.

Will things get better? Certainly if there are some major security catastrophes, buyers
will change their priorities and systems will become more secure. Short of that, the best
we can do is to drastically simplify the parts of systems that have to do with security:

• Users need to have at most three categories for authorization: me, my group or
company, and the world.
• Administrators need to write policies that control security settings in a uniform
way, since they can’t deal effectively with lots of individual cases.
• Everyone needs a uniform way to do end-to-end authentication and
authorization across the entire Internet.
Since people would rather have features than security, most of these things are unlikely
to happen.
On the other hand, don’t forget that in the real world security depends more on police
than on locks, so detecting attacks, recovering from them, and punishing the bad guys
are more important than prevention.

Section 2.3 discusses these points in more detail. For a fuller account, see Bruce
Schneier’s recent book

Organizations and people that use computers can describe their needs for information
security under four major headings [Error: Reference source not found]:

• Secrecy: controlling who gets to read information.


• Integrity: controlling how information changes or resources are used.
• Availability: providing prompt access to information and resources.
Accountability: knowing who has had access to information or resources

4. Que: What are three advantages of encrypting data stored in the computer system?

Ans: Encryption can play a very important role in your day-to-day computing and
communicating:

• Encryption can protect information stored on your computer from unauthorized


access - even from people who otherwise have access to your computer system.
• Encryption can protect information while it is in transit from one computer system
to another.
• Encryption can be used to deter and detect accidental or intentional alterations in
your data.
• Encryption can be used to verify whether or not the author of a document is really
who you think it is.

Despite these advantages, encryption has its limits:

• Encryption can't prevent an attacker from deleting your data altogether.


• An attacker can compromise the encryption program itself. The attacker might
modify the program to use a key different from the one you provide, or might
record all of the encryption keys in a special file for later retrieval.
• An attacker might find a previously unknown and relatively easy way to decode
messages encrypted with the algorithm you are using.
• An attacker could access your file before it is encrypted or after it is decrypted.

5. Que: Discuss how the asymmetric encryption algorithm can be used to achieve the
following goals:

a. Authentication: the receiver knows that only the sender could have
generated the message.

b. Secrecy: only the receiver can decrypt the message.

c. Authentication: only the receiver can decrypt the message, and the
receiver knows that only the sender could have generated the message.

Ans: Symmetric Encryption


Symmetric encryption is the oldest and best-known technique. A secret key, which can
be a number, a word, or just a string of random letters, is applied to the text of a
message to change the content in a particular way. This might be as simple as shifting
each letter by a number of places in the alphabet. As long as both sender and recipient
know the secret key, they can encrypt and decrypt all messages that use this key.
Asymmetric Encryption
The problem with secret keys is exchanging them over the Internet or a large network
while preventing them from falling into the wrong hands. Anyone who knows the secret
key can decrypt the message. One answer is asymmetric encryption, in which there are
two related keys--a key pair. A public key is made freely available to anyone who might
want to send you a message. A second, private key is kept secret, so that only you
know it.

Any message (text, binary files, or documents) that are encrypted by using the public
key can only be decrypted by applying the same algorithm, but by using the matching
private key. Any message that is encrypted by using the private key can only be
decrypted by using the matching public key.

This means that you do not have to worry about passing public keys over the Internet
(the keys are supposed to be public). A problem with asymmetric encryption, however,
is that it is slower than symmetric encryption. It requires far more processing power to
both encrypt and decrypt the content of the message.

6. Que: What are the benefits of DFS when compare to a file system in a centralized
system.

Ans: The Distributed File System (DFS) technologies in Windows Server 2003 R2 offer
wide area network (WAN)-friendly replication as well as simplified, fault-tolerant access
to geographically dispersed files. The two technologies in DFS are as follows:

• DFS Replication. New state-based, multimaster replication engine that is


optimized for WAN environments. DFS Replication supports replication
scheduling, bandwidth throttling, and a new byte-level compression algorithm
known as remote differential compression (RDC).

• DFS Namespaces. Technology that helps administrators group shared folders


located on different servers and present them to users as a virtual tree of folders
known as a namespace. DFS Namespaces was formerly known as Distributed
File System in Windows 2000 Server and Windows Server 2003.

If you are using Windows Server 2003 R2 and want to keep folders synchronized, we
recommend using DFS Replication instead of FRS. DFS Replication system in Windows
Server 2003 R2 has many benefits over File Replication Service (FRS), including
improved management tools, higher performance, and delegated management.

The Distributed File System (DFS) is used to build a hierarchical view of multiple file
servers and shares on a network. Instead of having to supply a specific machine name
for each set of files that are hosted on multiple servers, the user is only required
to supply one name. This will serve as the 'key' to a list of shares found on multiple
servers on the network. In summary, DFS can best be described as a logical list of
folders in one centralized view that contains links which point to one or more servers
that physically host those shares.

7. Que: What aspect of distributed system would you select for a system running on a
totally reliable network?

Ans: Microsoft has heavily invested in understanding and meeting the needs of both its
desktop and enterprise customers. Now that ERP systems have evolved to serve a
mission critical role, Microsoft understands the imperative that these systems be
deployed on a platform that provides a rich feature set that assures the following:

• Reliability: As an organization becomes more becomes more dependent on a


money-saving ERP application, the reliability of that system becomes critical. Any
unplanned downtime can lead to reduced productivity and lost revenue.
Integrated ERP systems are expected to run full time, ensuring that users and
customers have access to information on demand.
• Scalability: The ERP platform must also be able to easily handle growing
amounts of data and large numbers of concurrent users while still maintaining
reasonable response times and allowing for future growth. In a constantly
changing environment, the ability to add capacity with minimal downtime or risk
to system integrity is absolutely essential.
• Security: With increasing volumes of sensitive data such as customer and
financial information stored on ERP systems, organizations must take every
possible measure to maximize security. However, managing a secure
environment presents an increasing challenge as an organization and the
systems on which it depends grow in complexity. Moreover, with today’s
extended organizations involving suppliers and customers increasingly linked
together, managing security can be overwhelming and costly without the right
infrastructure. Microsoft has addressed this need with a mature and widely
adopted technology for identity management, data integrity, and protection from
intentional attack.
• Low Total Cost of Ownership (TCO): Beyond the lure of low cost of acquisition,
an organization needs to consider the TCO. This cost includes investments in
hardware, operating system, database, skilled support staff, and network
infrastructure. Next to reliability and scalability, the TCO has been identified by
many businesses as the most important consideration.
• Interoperability: The decision to deploy or upgrade an ERP system is frequently
accompanied by other hardware and software upgrades. As a result, it’s common
for legacy information systems to coexist as new technology is incrementally
deployed. The resulting heterogeneous environment in today’s organizations
makes it challenging to efficiently support interoperability. Microsoft’s response to
this need is a set of powerful, award-winning management tools that support the
integration of your existing legacy systems with the Microsoft platform.
• Ease of Manageability: Managing an ERP system can be difficult. It is important
for an organization to choose a platform that provides robust tools to easily tune
their system. While contributing to a low TCO, an easily managed system can
also ensure an organization the best reliability, scalability, and security its
platform allows.
A recent study by the META group followed companies that had replatformed
their UNIX–based ERP systems to Windows Server 2003 with SQL Server
2000.1 This study showed savings for these companies of more than 50 percent
in several intangible areas, such as accessibility and responsiveness, with
savings in tangible costs and IT staff time of nearly 25 percent. The increased
manageability of SQL Server 2000 on Windows Server 2003 can assist in
dramatically reducing a company’s TCO.
8. Que: What is a lock-key mechanism? Compare this mechanism with other
implementations of Access Matrix.

Ans:A distributed, persistent memory system is considered, which implements a form of


segmentation with paging within the framework of the single-address-space paradigm of
memory reference. A peculiar problem of a system of this type is the lack of protection
of the private information items of any given process against unauthorized access
attempts possibly performed by the other processes. We present a set of mechanisms
able to enforce access control over the private virtual space areas. These mechanisms
guarantee a degree of protection comparable to that typical of a multiple-address-space
system, while preserving the advantages of ease of information sharing, typical of the
single-address-space model. The resulting environment is evaluated from a number of
salient viewpoints, including ease of distribution and revocation of access rights,
strategies for virtual space reuse, and the storage requirements of the information for
memory management

A mechanism proposed in 1890 by Emil Fischer (1852–1919) to explain binding


between the active site of an enzyme and a substrate molecule. The active site was
thought to have a fixed structure (the lock), which exactly matched the structure of a
specific substrate (the key). Thus the enzyme and substrate interact to form an enzyme-
substrate complex. The substrate is converted to products that no longer fit the active
site and are therefore released, liberating the enzyme. Recent observations made by X-
ray diffraction studies have shown that the active site of an enzyme is more flexible than
the lock-and-key theory would suggest.
1
9.Que:The access-control matrix could be used to determine whether a process can
switch from, say, domain A to domain B and enjoy the access privileges of domain B. is
this approach equivalent to including the access privileges of domain B in those of
domain A?

Ans: Yes, this approach is equivalent to including the access privileges of domain B in
those of domain A as long as the switch privileges associated with domain B are also
copied over to domain A.

10. Que: How does the principle of least privileges aid in the creation of protection
systems?

Ans: The principle of least privilege allows users to be given just enough privileges to
perform their tasks. A system implemented within the framework of this principle has the
property that a failure or compromise of a component does the minimum damage to the
system since the failed or compromised component has the least set of privileges
required to support its normal mode of operation.

11. Que: How can systems that implement the principle of least privileges still have
protection failures that lead to security violations?
Ans: The principle of least privileges only limits the damage but does not prevent the
misuse of access privileges associated with a module if the module were to be
compromised. For instance, if a system code is given the access privileges to deal with
the task of managing tertiary storage, a security loophole in the code would not cause
any damage to other parts of the system, but it could still cause protection failures in
accessing the tertiary storage.

S-ar putea să vă placă și