, , , , ,

[SOLVED] EE5815 Topics in Security Technology Assignment 3 R

$25

File Name: EE5815__Topics_in_Security_Technology_Assignment_3_R.zip
File Size: 489.84 KB

5/5 - (1 vote)

EE5815 – Topics in Security Technology

Assignment 3

Electronic submission only on Canvas

Submission guidelines:

–     Please prepare your assignment in “PDF” format.

–     For observe the departmental rules for late submission (i.e. 10% deduction per day).

–     10 points for each question.

Security Management

1)  Assume that you area manager responsible for the security of e-Banking systems in a bank. You heard that HongKong Monetary Authority (HKMA) had a guideline called the “Supervision of E-banking”

a)    Google for the document, and give the URL showing where the above HKMA guideline fore-Banking can be found.

b)   Read  the  HKMA  guideline.  Briefly  describe  at  least  three   major technology-related controls relevant to e-banking that you need to consider in youre-Banking infrastructure.

[Hint: you only need to give a brief description (that is, a few lines) summarizing  the  main  points.  Please  don’t  simply  copy  pages  of paragraphs from the HKMA document without understanding. ]

c)    Your  HK  e-Banking  system  is  using  a  Cisco firewall to protect the Internet  perimeter  and  your  IT  colleagues  are  familiar  with  this firewall. Now, to strengthen the security, it is proposed to purchase for another firewall to set up another tier of internal firewall.  Your IT colleagues proposed to purchase the same Cisco firewall and use itas an internal firewall. Would you approve this proposal? Why?

d)   Goto the bank’s website of your account, is this website secure? Why? Identify  the  digital  certificate  from  the  website,   and  collect  the following information:  1)  Issue to,  2)  Issue  by,  3) Validity  Period, and 4) Fingerprints.

e)    Please collect the information in d) with the help of CityUGPT. Please notify the differences and analyze them

Public Key Systems

2)  In the RSA cryptosystem, it is possible that M = C, that is the plaintext and the  ciphertext  are  identical.  For  modulus  N  =  667,  and  encryption exponent e = 3, how many messages M would encrypt to itself? Please do not consider M = 0 or 1 in this question.

Technical Tools

3)  Network packet sniffing.

a)     Install Wireshark to your machine. Please show evidence (e.g. screen dump) that you have downloaded and installed this package into your personal computer.

b)     Describe the purpose of this program.  How do you start capturing the packets, and how do you use filters for just TCP packets?

c)     Start capturing the packets. While packet collection is still running, attempt to access to your email.

Describe:

How you access to your email (e.g. using webmail, or pop3, etc)

Can your username and password be seen during the sniffing process?

During  the  sniffing  process,  can  you  observe  other  network protocols in addition to the protocol that you used for email access? If so, name two such protocols and briefly explain why they exist.

d)     Compare the operations in b), c) and the operations you have done in the team-based  learning  class.  Briefly  describe  the  similarities and differences.

4)  Install a mobile banking app to your iOS or Android device (if you don’t have these devices, do this exercise with a web browser connecting to an e-banking site).

a)    Name the app or web environment you will use in this exercise.

b)   Google for “web debugging proxy”. Pick one of such tools (e.g. “Fiddler Web Debugger”, “Burp Suite”, etc) and attempt to use it as a proxy to capture the list of URLs visited by your chosen mobile banking app.

Go to the login name, and arbitrary input values to attempt to login (You don’t really need to login with a valid username / password; a failed login is good enough.  But please only try it once)

Show the list of URLs that will be involved in the login process. Are all requests to the bank protected by SSL?

c)    Display  the  digital certificate of the BOCHK website, and elaborate what kind of encryption standards are being used in this certificate.

Sage Questions

5) ECC Question,please show your code and results in your answers.

a.)  Define  an  elliptic  curve  over  the  finite  field  with  suitable  parameters where p should be a 11-bit prime.

b.)  Encrypt  the  message  M=”2024EE5815″  using  ECC  with  the  NIST’s secp521 elliptic and decrypt back the plaintext.

6) RSA Question, please show your code and results in your answers.

a.)  The RSA key ‘n’ is 4819. What are the factors (pand q) of ‘n’?

b.) Using (a),when e = 7, what are the corresponding public and the private keys?

c.)  The RSA encrypted message ‘C’ is received by both Alice and Bob whose

private   and    public    keys    are    ‘da,     (ea,    na)’    and    ‘db,     (eb,    nb)’ respectively. If the original message before the encryption is ‘M’,who is the intended recipient of the message? [M=190,  C=1912,  (ea,  na)=(31, 5293),   da=2491,   (eb,   nb)=(31,   4891),   db=3679].  Please  show  your detailed process of computing.

Hands-on Practice Question

7) In this exercise, you need to create a free account on Google Cloud Product and learn  one  tutorial   on https://cloud.google.com/docs/tutorials to  use  Google Cloud to use function and products to realize some design on the website.

The followings are some instructions for this lab session.

Requirements:

a)   Please  notify which tutorial you read and what you have learned in Google Cloud,or

b)   (10 points) You can also learn other products of cloud products. Please also introduce the content as shown in a).

c)   (Bonus:  10 points) You can finish one tutorial with the help of guidance and generate certain outputs. Please show your results and introduce what you have learned in this process.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Shopping Cart
[SOLVED] EE5815 Topics in Security Technology Assignment 3 R
$25