Network Security

 

1.3 List and briefly define categories of passive and active network security attacks.

1.5 Explain the difference between an attack surface and an attack tree.

Problems

1.3 Consider a desktop publishing system used to produce documents for variousorganizations.

a. Give an example of a type of publication for which confidentiality of the stored datais the most important requirement.

b. Give an example of a type of publication in which data integrity is the most importantrequirement.

c. Give an example in which system availability is the most important requirement.

1.5 Consider the following general code for allowing access to a resource:

DWORD dwRet = IsAccessAllowed(…);if (dwRet == ERROR_ACCESS_DENIED) {// Security check failed.// Inform user that access is denied.} else {// Security check OK.}

a. Explain the security flaw in this program.

b. Rewrite the code to avoid the flaw.

1.7 Consider a company whose operations are housed in two buildings on the sameproperty: one building is headquarters, the other building contains network and computerservices. The property is physically protected by a fence around the perimeter. The onlyentrance to the property is through a guarded front gate. The local networks are splitbetween the Headquarters’ LAN and the Network Services’ LAN. Internet users connect tothe Web server through a firewall. Dial-up users get access to a particular server on theNetwork Services’ LAN. Develop an attack tree in which the root node representsdisclosure of proprietary secrets. Include physical, social engineering, and technicalattacks. The tree may contain both AND and OR nodes. Develop a tree that has at least15 leaf nodes.

Sample Solution

Network Security

A security attack is an unauthorized attempt to steal, change, damage, or expose data from an information system such as your website. Active and passive attacks are security attacks. In active attack, an attacker tries to modify the content of the messages. In passive attack, an attacker observes the messages, copy them and may use them for malicious purposes. Passive attacks can take various forms, including traffic analysis, eavesdropping, footprinting, and war driving. Types of active attacks include masquerade, repudiation, replay, and denial of service. There is a difference between attack surface and attack tree: the main theme of attack tree is to structure the process of identifying threats in information security. Attack surface, on the other hand, consists of the reachable and exploitable vulnerabilities in a system.

Brands do not just use storytelling for no reason, as discussed previously, they use storytelling strategically to make an emotional connection to the consumer which has become a need in modern day. The first of these ‘checkpoints’ is the message of the story. This central message, “is an ideological or moral statement that works as a central theme throughout the story” (Fog, 2004:34). Klaus Fog uses Romeo and Juliet as an example of a moral, being “true love conquers even death”. The consumer is able to internalise and fully understand what the brand is trying to portray when a core moral, or ‘message’ is at the central theme of any story.

The second of these checkpoints is the conflict of the story. “Conflict is the driving force of a good story. No conflict, no story” (Fog, 2004:35). What Klaus Fog means by conflict is not something negative, it is a way in which the storyteller, or in this case brands, can communicate their perception of right and wrong. The reason why conflict is such a big factor to play in stories, is because “As humans, we instinctively look for balance and harmony in our lives. We simply don\’t like being out of tune with our surroundings and ourselves. So, as soon as harmony is disrupted we do whatever we can to restore it. We avoid unpleasant situations, feelings of stress or anxiety” (Fog, 2004:35). By having conflict within a story, the consumer can relate to the brand on a more emotional level, rather than just being skin deep.

Thirdly, the characters involved are a key feature to any story. “In order to get personally involved with a story, we, as readers or listeners, must be able to identify with the characters” (Fog, 2004:41). The use of characters helps to create the emotional connection to the consumer as spoken about previously. The way it does this is because as a consumer, we may be able to see part of our self in one of the characters. This makes a relation between the consumer and the character. The reason for this is because if we can identify with the characters, we can fully embrace and understand the story.

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.