Evaluate the security of a password management protocol

Assignment Help Computer Network Security
Reference no: EM13862477

Q1: Cracking password management protocols

One of the best ways to evaluate the security of a password management protocol is to try to crack it yourself. Fortunately, you do not need to be an expert hacker to do this. A number of password cracking tools are available for free online.

For this Discussion, you will choose one example of a password management protocol (this includes password creation, storage, revocation, etc.) in any product suite you have used (e.g., Microsoft, Apple, Adobe, etc.) and discuss its security or insecurity with your colleagues. Then you will install one of the available cracking tools to see whether you can crack this system and share your experience with your colleagues.

To complete this Discussion:

Post: Name the product and the associated password management protocol you selected. Analyse the good and bad practices of this protocol. Install a password-cracking tool and try to crack that product. Then share your experience with your colleagues using screenshots. Recommend ways this protocol could be improved, if possible, and explain the results of the improvements you recommended.

Q2: Context and environment

In a pervasive computing environment, context plays an important role. Services are provided in a smart way based on the surrounding conditions (i.e., contextual attributes). From a security perspective, security services such as access control have to reflect this fact and be context-aware. With that in mind, consider the following scenario:

Alice, a security researcher, thinks that the role-based access control (RBAC) model, along with all traditional access control models, is not suitable. Bob thinks the opposite. Bob thinks RBAC, for instance, could be used to grant/deny permissions in such an environment.

For this Discussion, you will consider the current access control models you have seen so far and align yourself with either Alice or Bob.

To complete this Discussion:

Post: Take a position in which you agree with either Alice or Bob as described in the example, or if you are somewhere in between. Evaluate the suitability of role-based access control (RBAC) for accommodating contextual information in the access control decision-making process. Identify and describe any obstacles, and explain your solutions for them. Given the access policy, evaluate whether or not Extensible Access Control Markup Language (XACML) could be used to express the contextual attributes.

Encryption case study

ABC Company uses the cloud for its applications. It uses a password management application that stores passwords in a protected file encrypted by a single password. The password is five alphabetic characters and is changed on a monthly basis by the administrator, who delegates that to a colleague in case of the administrator's absence. When a subject seeks access to a certain protected object, the application decrypts the whole file in memory and matches the subject's password with the one in the store. The access control system does not accommodate contextual attributes in its access decision.

Verified Expert

Reference no: EM13862477

Questions Cloud

What is the basis of the truck for determining?depreciation : Carrie owns a truck costing $13,000 and used for personal activities. The truck has a $9,900 FMV when it is transferred to her?business, which is operated as a sole proprietorship. What is the basis of the truck for determining?depreciation? What is ..
What problem do you believe is the most pressing : What problem do you believe is the most pressing, and why would you address that problem first? What are the expectations that you would share with the inmates and the guards about your plan
Using the effective interest method : On 1/1/2014 the Jackson Co. has a $40,000 debt outstanding which matures on 12/31/16. Interest which is payable on Dec. 31 of each year, was last paid on 12/31/13. Using the effective interest method. how much interest expense is recognized on the de..
What is the basis of the house for depreciation : Tara owns a house that she has been living in for eight years. She purchased the house for $200,000 and the FMV today is $ 160,000. She is moving into her?friend’s house and has decided to convert her residence to rental property. Assume 20% of the?p..
Evaluate the security of a password management protocol : Evaluate the security of a password management protocol is to try to crack it yourself. Fortunately, you do not need to be an expert hacker to do this.
Journal entry to record the redemption of the bonds : Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ..
Employees income tax rates to increase : Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 ..
What are some of the social emotional : What are some of the impacts of these disorders on the community?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Research paper about data encryption techniques

Write a research paper about data encryption techniques. Your content should include the following: Business advantages and disadvantages of full disk encryption, compared to other types of encryption techniques.

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  Evaluate an organization''s security policies

Evaluate an organization's security policies and risk management procedures, and its ability to provide security countermeasures. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.

  Aid in hacking into computer networks

what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the ..

  You are a senior network engineer at a technology firm

you are a senior network engineer at a technology firm. your company has 500 employees. your ceo meets with you and

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Write a program for recursive algorithm

Consider the following recursive algorithm

  Explain how it is forwarded to its destination

Explain how it is forwarded to its destination and a packet arrived at router R2-m0 with destination address 170.14.24.12. Explain how it is forwarded to its destination.

  Topic is security threats and vulnerabilities

The paper topic is Security Threats and Vulnerabilities it must be written based off of the attached outline it also must be 5-6 pages

  Use prevention-detection and recovery to secure records

Iit is highly desirable that whoever treats you has access to your record. Using your justification how would you use prevention, detection and recovery to secure the records?

  Analyze issue using social contract and rule utilitarianism

Analyze issue using Social Contract, Kantianism, Act Utilitarianism, Social Contract Theory, Virtual Ethics and Rule Utilitarianism.

  Identify the anomaly in the traffic organisation going

Identify the anomaly in the traffic this organisation is going through. What sort of evidence do you have to make this claim. What sort of utility or tool do you think the "attacker"is using to conduct this attack

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd