Identify five security threats

Assignment Help Computer Engineering
Reference no: EM132132932

Assignment

The SmurfWare SmurfScanner is a new biometric authentication device to keep non-Smurfs out of the Smurfland network. The biometric device is being dubbed the SmurfScanner by Papa Smurf. The SmurfScanner is a hardware device that scans a user's skin color for blueness.

Since only Smurfs have that unique Saturday morning cartoon blue color, if the device can successfully identify the unique blue, then this will do for making a determination as to whether or not a person really is a Smurf (or at least we make this assumption for the purposes of this exercise, be based in actual fact or not). The SmurfScanner is attached to a PC running MicroSmurf Windoze X via serial port. Along with an all-blue user manual and a blue SmurfWare coffee mug, the SmurfScanner comes with software that allows it to act as the login screen manager in Windoze.

To even get to the login screen, a user's Smurfness has to be established by the SmurfScanner. Once calibrated by the manager application, the SmurfScanner returns whether or not a user is sufficiently blue. SmurfScanner Architecture Component Description Smurfscanner Crypto Helper: Since actual authentication traffic between the scanner and the software has to be encrypted and integrity has to be ensured, the software package provides an API for making encrypted calls, such as IsUserASmurf(), to the SmurfScanner.

The caller gets to decide whether to use the proprietary but extensively tested (by two Smurf crypto experts) SmurfCrypto library or the equally solid MicroSmurf Windoze implementation of crypto. The Helper exists in both the PC and the SmurfScanner hardware to facilitate two-way integrity and privacy.

SmurfScanner Common Command Layer: The SmurfScanner formats higher-level API calls into a format that the serial driver can understand, be they encrypted or not. SmurfScanner Manager: Since this application is rarely used, crypto was deemed unnecessary.

Instead, the Smurfs hard-coded a hash of Smurfette's body weight in milligrams in both the SmurfScanner and the Embedded I/O Manager so that the SmurfScanner's Embedded I/O Manager would recognize that the privileged commands were coming from only the SmurfScanner Manager application. The Manager application appends this hash to every command sent to the scanner. The Smurfs chose this secret method because Smurfette's body weight is a well-known fact with the entire Smurf community but not known at all outside of it.

The Manager application is used to set up the scanner's calibration and to run diagnostics in case it is malfunctioning. The scanner must be calibrated for local light conditions with a sample of Smurf before use. The Manager is also used to initialize the Helper apps on both the PC and the scanner with secrets to allow the integrity and privacy functionality to work.

The secrets are a hash of the system clock. SmurfScanner Embedded I/O Manager: This app sorts encrypted versus unencrypted commands and forwards them to either the Helper or directly to the Logic Layer. Commands are sent directly to the Logic Layer when the I/O Manager recognizes the Smurfette body weight shared secret hash. SmurfScanner Logic Layer: This layer takes the hardware measurement of the user's blueness and compares it to the calibrated value and returns a yes or no, thus performing authentication on a Smurf.

The Logic Layer also does other things like calibrate the scanner based on data received from the Manager app, track usage, and run diagnostics. SmurfScanner Business Application: It is critical to understand the business context in order to estimate impact (in such a way as to answer the "Who Cares?" question). In this case, the SmurfScanner is being used to protect SmurfTunes from use by non-Smurfs. SmurfTunes is set up to deliver Saturday morning cartoon theme songs to SmurfPod personal digital listening devices.

Based on the SmurfWare SmurfScanner description, identify five security threats (types of attacks) that are applicable and provide insight into the vulnerabilities that the threats pose to the SmurfWare SmurfScanner.

Finally, list two security controls (safeguards/ countermeasures) for each threat as it applies to this project.

Reference no: EM132132932

Questions Cloud

Discuss about the simple keynesian model : Businesses continually pressure the Federal Reserve to lower nominal interest rates. They argue that this action will lead to beneficial results in the economy.
Limit theorem and the empirical rule : In a specific sample size of 100, what is the range within the groups average iron level would be considered ususal?
What percentage of the time is the owner waiting on table : What percentage of the time is the owner waiting on a table?
What is alternative hypothesis and p-value : Add the 5% significance level, has there been an increase in production? What is alternative hypothesis and p-value?
Identify five security threats : Identify five security threats (types of attacks) that are applicable and provide insight into the vulnerabilities that the threats pose.
What is the alternative hypotheses and p-value : At the 5% significance, does facility A produce higher a number of defective units out of its total production than facility B?
What is the change in the total amount : Assume a visitor from another nation decides to open a checking account at J & R National Bank. The visitor deposits $20,000 that is new money to the Macro.
What are your views on how the can be addressed : Australian are considered generally under-insured (from a personal insurance perspective). Discuss what this statement means and what are your views.
Functions of management accounting-compliance-control : Explain three functions of management accounting. Compliance, Control, and Competitive Support. Give examples.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd