• Tidak ada hasil yang ditemukan

Computer Security Systems Course, 6803532-3

N/A
N/A
Protected

Academic year: 2024

Membagikan "Computer Security Systems Course, 6803532-3"

Copied!
2
0
0

Teks penuh

(1)

1

Kingdom of Saudi Arabia ةيدوعسلا ةيبرعلا ةكلمملا Ministry of Education ميلعتلا ةرازو

Umm AlQura University ىرقلا مأ ةعماج

Adham University College مضأب ةيعماجلا ةيلكلا

Computer Science Department للآا بساحلا مسق

Second Semester of 2017/ 2018 Academic Year

Computer Security Systems Course, 6803532-3 -Exceptional HomeWork-

Last Delivery Date Tuesday, 08/08/1439 H – 24/04/2018

Question One: 3 Marks

Consider a hospital system for managing the hospital processes, a patient can register to the system through the national ID, can book an appointment and see analysis results, etc.

a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement.

b. Give an example of a type of publication in which data integrity is the most important requirement.

c. Give an example in which system availability is the most important requirement.

Question Two: 2 Marks

For each of the following assets, assign a low, moderate, or high impact level for the loss of confidentiality, availability, and integrity, respectively. Justify your answers.

a.A law-enforcement organization managing extremely sensitive investigative information.

b.A financial organization managing routine administrative information (not privacy-related information).

c. A Social media application, like twitter.

d. A University system for managing students’ registrations, schedules, results, etc.

Question Three: 1 Mark

Perhaps the simplest “serious” symmetric block encryption algorithm is the Tiny Encryption Algorithm (TEA). TEA operates on 64-bit blocks of plaintext using a 128-bit key. The plaintext is divided into two 32-bit blocks (L0, R0), and the key is divided into four 32-bit blocks (K0, K1, K2, K3).

Encryption involves repeated application of a pair of rounds, defined as follows for rounds i and i+1:

Li=Ri-1

Ri=Li-1 ⊞ F(Ri-1, K0, K1, i) Li+1=Ri

Ri+1=Li ⊞ F(Ri, K2, K3, i+1)

where F is defined as F(M, Kj, Kk, i) = ((M<<4) ⊞ Kj)  ((M>>5) ⊞ Kk)  (M⊞i)

and where the logical shift of x by y bits is denoted by x << y, the logical right shift of x by y bits is denoted by x >> y, and i is a sequence of predetermined constants.

(a) Comment on the significance and benefit of using the sequence of constants.

(b) Illustrate the operation of TEA using a block diagram or flow chart type of depiction.

(2)

2

Kingdom of Saudi Arabia ةيدوعسلا ةيبرعلا ةكلمملا Ministry of Education ميلعتلا ةرازو

Umm AlQura University ىرقلا مأ ةعماج

Adham University College مضأب ةيعماجلا ةيلكلا

Computer Science Department للآا بساحلا مسق

Question Four: 3 Marks

Consider a 32-bit hash function defined as the concatenation of two 16-bit functions:

XOR and RXOR, which are defined in Section 3.2 (See the book) as “two simple hash functions.”

a. Will this checksum detect all errors caused by an odd number of error bits? Explain.

b. Will this checksum detect all errors caused by an even number of error bits? If not, characterize the error patterns that will cause the checksum to fail.

c. Comment on the effectiveness of this function for use as a hash function for authentication.

Question Five: 1 Marks

Consider the following threats to Web security and describe how each is countered by a particular feature of SSL.

a. SYN Flooding: An attacker sends TCP SYN messages to request a connection but does not respond to the final message to establish the connection fully. The attacked TCP module typically leaves the “half-open connection” around for a few minutes. Repeated SYN messages can clog the TCP module.

Remember,“Success is 1% inspiration and 99% perspiration”

Do your Best 😉 T.Mariah Sami Ahmed Khayat Teacher Assistant @ Adam University College

[email protected]

Referensi

Dokumen terkait

The Automatic Correction Seraj: Kingdom of Saudi Arabia ةيدوعسلا ةيبرعلا ةكلمملا Ministry of Education ميلعتلا ةرازو Umm AlQura University ىرقلا مأ ةعماج Adham University College

1 Kingdom of Saudi Arabia ةيدوعسلا ةيبرعلا ةكلمملا Ministry of Education ميلعتلا ةرازو Umm AlQura University ىرقلا مأ ةعماج Adham University College مضأب ةيعماجلا ةيلكلا Computer

1 Kingdom of Saudi Arabia ﺔ�دﻮﻌﺴﻟا ﺔ���ﻌﻟا ﺔ�ﻠﻤﻤﻟا Ministry of Education ﻢ�ﻠﻌﺘﻟا ةرازو Umm AlQura University ىﺮﻘﻟا مأ ﺔﻌﻣﺎﺟ Adham University College ﺔ�ﻠ�ﻟا ﻢﺿﺄب ﺔ�ﻌﻣﺎﺠﻟا Computer

ةيدوعسلا ةيبرعلا ةكلمملا ىرقلا مأ ةعماج - ميلعتلا ةرازو تابلاط – ةذفنقلاب ةيعماجلا ةيلكلا ةيبرعلا ةغللا مسق ررقملا فيصوت ررقملا زمر ررقملا مسا ةيسيردتلا تادحولا 2-2802470 ة4يناسل

1 Kingdom of Saudi Arabia Ministry of Education Umm AlQura University Adam University College, female branch Computer Science Department ةيدوعسلا ةيبرعلا ةكلمملا ميلعتلا ةرازو ةعماج

1 Kingdom of Saudi Arabia Ministry of Education Umm Al-Qura University Jumum University College Math’s’ Department ةيبرعلا ةكلمملا ةيدوعسلا ميلعتلا ةرازو ىرقلا مأ ةعماج ةيعماجلا

ةيدوعسلا ةيبرعلا ةكلمملا ميلعتلا ةرازو ىرقلا مأ ةـعماـج مضأب ةيعماجلا ةيلكلا Kingdom of Saudi Arabia Ministry of Education Umm Al-Qura University University College in Adham ناتعاس

3 Kingdom of Saudi Arabia ةيدوعسلا ةيبرعلا ةكلمملا Ministry of Education ميلعتلا ةرازو Umm AlQura University ىرقلا مأ ةعماج Adham University College مضأب ةيعماجلا ةيلكلا Computer