Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

2. Explain the CIA triad. For each part of the triad, outline attacks on a datab

ID: 3884183 • Letter: 2

Question

2. Explain the CIA triad. For each part of the triad, outline attacks on a database and possible protections.

3. Choose an application protocol that requires encryption. Describe that protocol in a few sentences and describe how you would attack the protocol.

4. What is a side-channel attack and describe one.

5. If you were a malware designer, would you rather use TCP or UDP to distribute a malicious payload and why?

6. What is the TCP triple-handshake and how can it be used in an attack? Which leg of the CIA triad would this attack fall under?

7. Give an example of an Internet worm. What vulnerability does the worm you cited exploit? What were the attack effects of the worm you cited, if any? What is a practical defense against the worm you cited?

8. Give an example of someone who suffered legal repercussions for writing or using malware.

9. What is an APT? What are some practical strategies to protect yourself from an APT?

10. Identify a large business which suffered a loss of business due to a successful malware attack. Was this a targeted attack? Was a perpetrator ever identified?

Explanation / Answer

(4).

The attack on the basis information obtained by the physical implementation of a cryptosystem, rather than using the normal methods like password or phrases or even the flaws in the algorithm is called a side-channel attack.

The information can be leaked by many ways like information on timings, using power, even noise can provide such information. These sources provide information and possibly lead to an attack to the system.

Various types of side-channel attack are :

Cache Attack

The ability of the attacking person to carefully observe the accesses made to the cache by the user in the physical system and use the information to attack the system is called cache attack.

Cache attack based on the initial state of cache are :

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote