Reference no: EM132394348 , Length: word count : 1500
CSE1ACF: Cyber Algorithms That Changed the Future
Assignment : Design and Implementation of Cyber Algorithms
1000-1500 words
Goal
To demonstrate your knowledge of the following:
• Express a set of ordered steps in a formal language;
• Illustrate the use of algorithms in solving cybersecurity problems
• Analyse the steps required to execute an algorithm correctly
Assignment
You lead a team of security experts responsible for the designing and setting up the security infrastructure of a large international bullion trading company (specialising in gold and silver precious metals in the form of coins, ingots, or bars) with offices in Australia, Asia, Europe and the USA.The company employs a total of 1300 staff in 13 cities worldwide.
The trading system was designed and implemented by a 3rd party software company 15 years ago using Windows XP as the front-end with password access control. The server is running Windows Server 2012 located in Sydney with a backup site in London.
Recently, the organisation has received confidential information from the Interpol that forgery orders have been placed by “ghost” traders within the organisation and “fake” coins and bars have beenshipped from some branches in Europe.
The board is highly concerned with this allegation and wants your team to find out what had gone wrong with the trading system and identify any remedial actions could be taken to stop future similar allegation.
Your team is required to perform the following:
• Identify any possible weaknesses in the existing operating environment;
• Recommend any automated and manual measures to be established to detect, deter, and delete any possibility of “ghost” traders and forgery trades;
• Propose any new procedures and algorithms required to assure the authenticity of traders and the trades. This may include mechanisms to:
o Authenticate and authorise the Traders when placing an order
o Detect any “fake” bullion bar or coin from going in and out of the organisation.
Instructions
Your report should describe your understanding of the problem areas that the company is facing and provide evidence how your team have identified the footprints left by the “ghost” traders.
You may consider using one of the digital forensic investigation models (covered in week 2) to describe the possible types of attacks experienced by the trading system and the impact to the system.
You need to describe your suggested enhancements to the cybersecurity procedures for the company and the required algorithms to be implemented in delivering the enhanced features in the system.
You may also wish to discuss the use of biometric (e.g. face and fingerprint) authentication and authorisation mechanisms as well as the use of symmetric encryption or asymmetric encryption techniques, asymmetric key exchange technique and digital signatures; in protecting the privacy and integrity of trading orders.
You may also consider using error detection and correction techniques (e.g. hash function, Hamming Code, CRC, etc.) to ensure the trade orders are placed and executed correctly.
Furthermore, you may consider the use of automated neural networks and pattern recognition techniques to determine the existence of any “fake” bullion and forgery order in the receiving and dispatching of bullion in each branch office.
For each area of the recommended implementations, your team is required to express the proposed implementation with a set of ordered steps in a formal language (those you have learned in this subject), such as:
• Lexical Analysis to analyse valid trade orders;
• Metawords to describe the properties of a valid trade order;
• Pseudo Code or Turing Machine to explain the steps involved in the authentication, authorisation, neural networks and pattern recognition techniques in error detection;
• Decision Tree, Cluster Analysis, and/or Neuro Network to implement automated detection of “fake” bullion (coin and bar);
You may also consider using diagrams (such as Flow Chart, Network Diagram, Process Flow Diagram, and/or other tools that you have learned in this subject) to illustrate the algorithms that your team is going to implement.