Question 1a describe what a turtle shell architecture is

Assignment Help Computer Networking
Reference no: EM13349374

QUESTION 1

(a) Describe what a Turtle Shell Architecture is and give an instance.

(b) Briefly clarify the principle of least privilege using an appropriate instance.

(c) Judge the following block of codes underneath.

<?PHP
Include("db_connect.php")://handles database connection
$sql="INSERT
INTO users(reg_username,
Reg_password,
Reg_email)
VALUES(‘{$_POST[‘reg_username']}'
‘$reg_password'.
‘{$_POST[reg_email']})':
Mysql_close():
?>

Imagine that this query is creating a new account. The user gives a desired username and an email address. The registration application generates a temporary password and emails it to the user to verify the email address.

If a valid email address is given ([email protected], for example), and "hamp98" is what the application generates for the password.
Give explanation whether an SQL injection attack is possible. Explicate your reasoning with an appropriate example.

(d) Let's presume a query in a product detail page as follows:
$sql="SELECT*FROMproductWHEREproduct_id='".$_GET[‘product_id]."'";

Now an intruder inserts an SQL command in the URL of the page, the code is like this 10'; DROP TABLE product; # and the URL looks like this:

https://abcfoods.com/product.php?id=10'; DROP TABLE product; #

At this instant the query becomes this:

SELECT * FROM product WHERE product_id='10'; DROP TABLE product; #';

You might be doubting what the meaning of hash "#" is. It simply tells the MYSQL server to ignore the rest of the query.
Explain what happen when the URL is processed with the injection as shown above.

(e) Briefly portray four methods how confidentiality can be ensured.

(f) Jane wishes to transfer $100 to Bob using bank.com. The request generated by Jane will look similar to the subsequent:

POST https://bank.com/transfer.phpHTTp/1.1
....
....
....
Content-Length:19:
Acct=BOB&amount=100

On the other hand, Maria notices that the same web application will execute the same transfer using URL parameters as tag along:

GET https://bank.com/transfer.php?acct=100HTTP/1.1


Maria now made a decision to exploit this web application vulnerability using Jane as her victim. Maria has to construct the URL which will transfer $100,000 from Jane's account to her account.

(i) Create the above URL for Maria

At this instant that her malicious request is generated, Maria must trick Jane into submitting the request. The most basic method is to send Jane an HTML email containing the link and expect Jane to click on it.

Assuming Jane is authenticated with the application when she clicks the link, the transfer of $100,000 to Maria's account will occur. However, Maria realizes that if Jane clicks the link, then Jane will notice that a transfer has occurred. as a result, Maria come to a decision to hide the attack in a zero-byte image.

(ii) Write the code that Maria must send to Jane in the email making use of a zero-byte representation.

(iii) Describe using an appropriate example how bank.com can prevent such security vulnerability.

(g) Portray three types of biometric identification schemes.

QUESTION 2

(a) In essence security is holistic. Explain this reasoning using appropriate examples.

(b) All secure systems should aim at providing some security concepts. Explain seven of them.

(c) Explicate three ways to authenticate a user and give an example of a real world two-factor authentication.

(d) What is an Access Control List?

(e) Present two ways how webmasters can ensure maximum availability of their web applications.

(f) Describe what happen during a DNS Cache Poisoning attack.

QUESTION 3

(a) Tell apart symmetric and public key encryption cryptographic systems and their modes of operation.

(b) Describe what hash functions are and using a suitable example show how to Work out the hash on a string using MD5.

(c) Elucidate what you understand by the terms hash collision and rainbow tables giving an appropriate example for each. Also describe how they can be prevented.

(d) Mark a 16-pass iterative and 9-pass recursive PHP function using hash algorithm sha1 and salt "iamsexyandiknowit" to hash password "passwordcanon".

Reference no: EM13349374

Questions Cloud

Question 1case study the retail landscape has undergone a : question 1case study the retail landscape has undergone a lot of changes in the last 15 years in mauritius. the
Question 1a there are two analysis techniques in reverse : question 1a there are two analysis techniques in reverse engineering for mobile apps static and dynamic.i set apart
Question 1the best practice approach to the development of : question 1the best practice approach to the development of a human resource strategy has severe limitations. best fit
Question 1successful service managers identify that : question 1successful service managers identify that managing demand and capacity is vital for both productive use of
Question 1a describe what a turtle shell architecture is : question 1a describe what a turtle shell architecture is and give an instance.b briefly clarify the principle of least
Question 1a what are the indispensable ingredients of a : question 1a what are the indispensable ingredients of a symmetric cipher?b what are the two basic meanings used in
Question 1a sort out each of the following as a violation : question 1a sort out each of the following as a violation of privacy integrity and ease of use authenticity or some
Question 1a explain network security what are the types of : question 1a explain network security. what are the types of security features used in client server types of network?b
Question 1aname five significant activities involved in a : question 1aname five significant activities involved in a digital forensic investigation.bwhy is computer forensic

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Benefits of authentication scheme

An example of when a failure may occur is if the clinet's MAC address is explicitly excluded in the AP/router configuration. What are the benefits of this authentication scheme?

  Defines minimum packet size network technology to allow ip

Although not explicity stated, the Internet Protocol(IP) specification,RFC 791, defines the minimum packet size a network technology must support to allow IP to run over it. Discuss the reasons for adopting that specific value.

  Design an ethernet network to connect a single client pc

Design an Ethernet network to connect a single client PC to a single server.  The two devices are 410 feet apart.  They need to communicate at 800 Mbps.  Your design will specify the locations of switches and the transmission line between the switche..

  What is the size of data in the ipv4 datagram

An IPv4 header bytes in Hex notation is given below: 45 c0 00 38 9b 3e 00 00 ff 01 fd 3b 80 99 90 01 80 99 91 56.Answer the following questions about the header:What is the size of data in the IPv4 datagram?

  Which of following is not class of client-server processing

Retail point of sale systems are an example of horizontal partitioning of data processing.

  Computing propagation delay of the link

Suppose there is a 10 Mbps microwave link between a geostationary satellite and its base station on earth. What is the propagation delay of the link?

  A computer that can test 2^40 keys each second

Given a computer that can test 2^40 keys each second. What is the expected time to find a key by exhaustive search given a key space, say 2^88. How do you go about figuring this out? Is there a formula or standard equation that is used?

  Question 1abriefly explain how the suspect dobson in utah

question 1abriefly explain how the suspect dobson in utah has been intercepting his ex-employer email.baccording to the

  Are these resulting subnets class c networks

You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.!

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

  Socio-technical perspective useful in organizations

How taking a socio-technical perspective can be more productive in helping organizations manage information overload than either technical solutions or organizational solutions alone?

  Explain the service in technical terms

Describe the service in technical terms. Make sure to include pricing information. Note: You may need to contact the provider to obtain this information

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd