1. Engineering
  2. Computer Science
  3. hello i was looking for a little help with filling...

Question: hello i was looking for a little help with filling...

Question details

Hello, I was looking for a little help with filling out this chart for practicing for an exam.

I'm supposed to put an intrusion, security goal violated, and the justification for why I chose the specified Intrusion and Security goal for each situation.

These are the intrusions available:

Interruption, Interception, Modification, Fabrication, and Invasion

These are the Security Goals available:

Confidentially, Integrity, Authentication, non-repudiation, Access control, and availability

The first one is an example and the next few are ones I attempted.

Intrusion(s) Security Goal(s) violated Availability Scenario Justification Bob crashes AlicesInterruption computer system by sending a flood of packets This is a classic case of DoS attack and hence falls under the category of interruption. Alice:s computer is unavailable for her use and hence the security goal violated is Availability. Another classic case of DoS and hence falls under the category of interception. Alice copies Bobs by evading into the network which is a violation of access control and availabilit Bob copying Alices assignment by accessing her hard drive is modification and her is violating his own integrity Alice changes the amount on Bobs cheque when it is being transmitted Alice copies Bobs assignment by eavesdropping on traffic from his machine. Access Control & Availability Interception Bob copies Alices assignment by accessing her hard drive. Modification Integrity Alice changes the amount on Bobs cheque when it is being transmitted. Modification Confidentiallythrough modification as her confidentiality is being infiltrated. This is modification and invading Bobs confidentiality. Bob sends a property deed to the Registrar in the name of Alice by forging Alices signature. Alice spoofs Bobs IP address to gain access to his office server. Bob installs malware on Alices computer. Bob obtains Alices credit card information online and has the credit card company replace it with another card bearing a different account number. Alice has a fake third party authenticate her server as legitimate.

Solution by an expert tutor
Blurred Solution
This question has been solved
Subscribe to see this solution