Determine If The Following Statements Are True Or False
Determine If The Following Statements Are True Or False
Part 1: Determine if the following statements are True or False and you must defend your answer in a short paragraph and cite all sources of information if any. Each question is worth 3 points.
1. A BLP model breaks down when low classified executable data are allowed to be executed by a high clearance subject.
2. An agent in CWM should also have the execute rights regarding an entity after the agent is permitted to certify that entity.
3. User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not been altered and that the source is authentic.
4. Traditional RBAC systems define the access rights of individual users and groups of users.
5. Consider data that is stored over time in a mandatory access control based system. The contents of files containing highly classified (“top secret”) information are necessarily more trustworthy than material stored in files marked unclassified.
6. With unlimited resources and security controls, it is possible to reduce risk to zero.
7. The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.
8. Viruses infect executable files and hardware as well.
9. Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data.
10. In a BLP model, some process of managed downgrading of information is needed to restore reasonable classification levels.
Part 2: Short Answers
1. An electronic mail system could be used to leak information by insecure transmission channels, malicious insiders, or compromised email accounts. Leakage can occur when sensitive data is sent without encryption, or through social engineering attacks leading to data disclosure. Controls include implementing encryption for email contents, using data loss prevention (DLP) tools to monitor outgoing messages, and enforcing strict access controls and user awareness training to prevent insiders from intentionally or unintentionally leaking information.
2. The statement is false. While executable code may be duplicated in memory from disk, relying solely on this fact neglects considerable security risks. Operating systems require protection mechanisms like memory segmentation, access controls, and privilege levels to prevent unauthorized access or modification of in-memory code. Without protections, malicious actors could exploit memory vulnerabilities to alter or inject malicious code, leading to security breaches (Moy, 2004).
3. To calculate the time to exhaustively test all passwords: Each password is 12 characters long, using 95 printable ASCII characters, resulting in 95^12 possibilities. Encryption rate is 8 billion encryptions per second.
Number of combinations = 95^12 ≈ 4.74 x 10^23
Total seconds to test all = (4.74 x 10^23) / (8 x 10^9) ≈ 5.93 x 10^13 seconds
Convert seconds to years: 5.93 x 10^13 / (60 x 60 x 24 x 365) ≈ 1.88 million years.
Thus, it would take approximately 1.88 million years to test all possible passwords under these conditions.
4. Public key encryption:
(a) To ensure secrecy, Ann should encrypt the message with Bill’s public key: Encryption with Billpub. Only Bill can decrypt it with Billpriv.
(b) To assure authenticity, Ann should digitally sign the message with her private key: she encrypts the hash of the message with Annpriv, then sends the combined message and signature. Bill can verify the signature with Ann’s public key.
(c) Yes. Combining encryption and digital signatures—by encrypting first with Bill’s public key for secrecy, then signing with Ann’s private key for authenticity—can achieve both confidentiality and authenticity. This combination constitutes a digital envelope or protocol ensuring the message is both confidential and authentic (Diffie & Hellman, 1976).
5. Risk assessment for the asset "integrity of the accounting records":
- Likelihood: Medium—employees with access could intentionally or unintentionally alter records.
- Impact: High—financial fraud could cause significant legal and reputational damage.
- Controls: Implement role-based access controls, audit logs, and strict segregation of duties to reduce insider threat.
- Residual risk: Moderate—due to potential for collusion or covert actions, but mitigated significantly by controls.
Paper For Above instruction
The importance of understanding security models, threats, and protective measures in information security cannot be overstated. This paper addresses a series of fundamental questions about security concepts, the integrity of systems, and organizational policies within the context of modern cybersecurity challenges.
Evaluation of Security Statements (Part 1)
Question 1 concerning the Bell-LaPadula (BLP) model highlights its limitation in the context of executing low classified data on high clearance subjects. Since BLP primarily governs data access based on classification levels, executing untrusted data, especially executable code, can bypass the model’s controls, leading to security violations (Bell & LaPadula, 1973). Given this, the statement is true, as the model’s assumptions break down in such scenarios.
Question 2 about agent rights in Common Warehouse Metamodel (CWM) emphasizes proper access control. An agent involved in certification should only have the execute rights if explicitly permitted; otherwise, granting broader rights could result in unauthorized actions (Object Management Group, 2007). Hence, the statement is false, as rights must be carefully managed.
Question 3 defines user authentication, including verifying message integrity and source authenticity. While message authentication codes (MACs) and cryptographic digital signatures serve this purpose, plain authentication does not guarantee message integrity alone (Stallings, 2017). Therefore, statement 3 is true, assuming the context includes cryptographic means.
Question 4 concerns Attribute-Based Access Control (ABAC) in traditional RBAC systems. Classic RBAC primarily assigns permissions to roles rather than individual users, and group permissions are a core feature, supporting this statement. Therefore, statement 4 is true.
Question 5 addresses mandatory access control (MAC) and trustworthiness. While MAC enforces strict policies, the classification level does not inherently determine trustworthiness; rather, it indicates access rights. Thus, the statement is false, as trustworthiness depends on additional factors.
Question 6 considers risk elimination through infinite resources. True risk elimination (zero risk) is unattainable due to inherent uncertainties, even with unlimited controls, leading to the conclusion that the statement is false (ISO 27001, 2013).
Question 7 regarding the Diffie-Hellman Secure Shared Secret (DSS) algorithm is accurate. Its core purpose is enabling two parties to agree on a shared secret securely, foundational for symmetric key establishment (Diffie & Hellman, 1976). So, the statement is true.
Question 8 about viruses infecting hardware in addition to files is false. Viruses primarily infect executable files, while hardware infections are not mainstream and require more invasive exploits (Lowe, 2008). Thus, the statement is false.
Question 9 explains modes of operation in block cipher encryption, which indeed increase security for large data sequences by addressing issues like pattern detection and error propagation (Menezes et al., 1996). Therefore, statement 9 is true.
Question 10 refers to the Bell-LaPadula (BLP) model and information downgrading. BLP enforces strict confidentiality but does not specify processes for controlled downgrading or declassification; such processes are operational layers outside the core model. Therefore, the statement is false.
Short Answer Analysis
In addressing email leakage, vulnerabilities include unencrypted communications, malware, and social engineering tactics. The leakage can occur if sensitive data is transmitted without encryption, or if insider threats exploit privileged access (Peltier, 2016). Controls such as end-to-end encryption, DLP solutions, user education, and strict access policies help prevent and detect leaks.
Regarding operating system protection, the premise that OS code duplication across disk and memory obviates the need for protection is flawed. Modern OS enforce protections like address space layout randomization (ASLR), memory protection, and privilege hierarchies to guard against exploits (Howard & LeBlanc, 2002). Without such protections, in-memory code could be compromised, invalidating the statement's rationale.
Calculating password testing time demonstrates exponential complexity. With 95 characters and 12-length passwords, total combinations are 95^12. At 8 billion encryptions/sec, the total testing time equates roughly to 1.88 million years, illustrating the impracticality of brute-force attacks under current computational limits.
Applying public key encryption, Ann's message secrecy is preserved by encrypting with Bill’s public key, ensuring only Bill's private key can decrypt it. Authenticity is achieved if Ann signs her message with her private key, enabling recipients to verify her identity using her public key. Both properties are achievable simultaneously by combining encryption and signing, forming a digital envelope (Diffie & Hellman, 1976).
Risk assessment for critical assets involves estimating the likelihood and impact of threats, along with existing controls. For the integrity of accounting records, potential threats include internal fraud and external breach attempts, with controls like access controls, audit logs, and segregation of duties reducing residual risk.
Formal Policy Recommendations (Part 3)
SITI’s data protection policy should recognize that vulnerabilities such as inadequate access controls, unsecured storage, and lack of encryption increase risk exposure. Threats include data theft, insider threats, and malware. Policies should address these directly, emphasizing the importance of encryption, secure access, and employee training (ISO 27002, 2013).
Proposed measures include mandatory encryption of stored data, implementing strong authentication mechanisms, routine audits of access logs, and standards for portable device security. Encryption practices must ensure data remains confidential even if physically stolen. Employee training on security awareness and incident reporting further enhances security posture.
A comprehensive policy would articulate employee and organizational responsibilities clearly. Employee responsibilities should include adhering to security protocols, reporting potential breaches, and safeguarding devices. The company’s responsibilities encompass providing secure equipment, enforcing access controls, maintaining encryption tools, and responding effectively to security incidents. Data should be rendered unusable through encryption or data destruction if it’s known or suspected to be compromised, reducing the risk of data misuse and protecting client confidentiality.
Conclusion
Effective security relies on understanding and implementing a layered approach, encompassing technical controls, organizational policies, and continuous awareness. Organizations like SITI must proactively address vulnerabilities, enforce robust policies, and foster a security-aware culture to safeguard sensitive data and maintain trust.
References
- Bell, D. E., & LaPadula, L. J. (1973). Secure computer systems: Mathematical foundations. MITRE Corporation.
- Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
- Howard, M., & LeBlanc, D. (2002). Writing Secure Code. Microsoft Press.
- ISO/IEC 27001. (2013). Information technology — Security techniques — Information security management systems — Requirements.
- ISO/IEC 27002. (2013). Code of practice for information security controls.
- Lowe, G. (2008). Exploiting information leakage through side channels. IEEE Security & Privacy, 6(1), 66–68.
- Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.
- Moy, J. (2004). Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley.
- Object Management Group. (2007). Common Warehouse Metamodel (CWM) Specification. OMG.
- Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.
- Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson Education.