NET 311-Tut1

Report
1
NET 311
INFORMATION SECURITY
Networks and
Communication
Department
TUTORIAL 1
Example from a news item


Sony has admitted that the personal data of PSN
users, which may have been illegally accessed in a
recent attack on the system, was not encrypted.
Thankfully, credit card information was stored
separately to the personal data and was
encrypted.
http://www.bit-tech.net/news/gaming/2011/04/28/sony-admits-personal-data-was-not-encrypted/1
For discussion
1.
2.
-
-
Which security services were not achieved by
Sony?
Analyze the news item using the terms :
Vulnerability ?
Attack ?
Prevent and Response?
Example from a news item

MI6 and the CIA have been warned that intelligence
may have been compromised by an agent in
Switzerland who downloaded vast quantities of data
onto portable hard drives and carried it out of a secure
building.
http://www.telegraph.co.uk/news/9722715/MI6-secrets-threatened-as-Swiss-spy-steals-a-mountain-ofdata.html

The sources say that he downloaded "terabytes" of
classified material from the Swiss intelligence service's
servers onto portable hard drives. He then left the
government building with a backpack containing the
hard drives.
http://www.zdnet.com/swiss-spy-agency-warns-cia-mi6-over-massive-secret-data-theft-7000008282/
For discussion


MI6 and the CIA have been
warned that intelligence may
have been compromised by an
agent in Switzerland who
downloaded vast quantities of
data onto portable hard drives
and carried it out of a secure
building.
The sources say that he
downloaded "terabytes" of
classified material from the Swiss
intelligence service's servers onto
portable hard drives. He then
left the government building with
a backpack containing the hard
drives.

Analyse this news item
using the terms



Threat and Vulnerability?
Attack
Prevent and Response?
Example:

Encrypt the following texts using the shift (Caesar)
cipher with the keys in brackets:
- “Welcome”
- “Open the door”
(Key=10)
(Key=5)
Example:



Use the following table as the key to encrypt the
following texts using the substitution cypher:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
E
N
Z
J
H
A
M
K
B
S
C
O
D
V
R
T
L
W
P
F
Y
Q
X
I
U
G
“Announce it tomorrow”
“DO IT”
Example:

The following text was encrypted using the
transposition cipher with the following mapping as
the key, decrypt the message :
1
2
3
4
3
4
5
Encrypt
1
2
Decrypt
5
• Cipher Text:
• SAHRIHOAPIOUEAYFIRNEOOEKLGFIONARRDWSET
EOUZYZO

similar documents