I. PART I : IDENTIFY VULNERABILITIES, THREATS, IMPACTS (35 points) IDONTCARE is a popular company doing e-commerce. They are located in a country where government is strict in protecting personal...

1 answer below »
Can you help me with this assignment.


I. PART I : IDENTIFY VULNERABILITIES, THREATS, IMPACTS (35 points) IDONTCARE is a popular company doing e-commerce. They are located in a country where government is strict in protecting personal information’s. Any company which neglects its obligations of protection personal information pays a large fine which represents 30% of the turnover. System architecture is described through the figure 1. Figure 1 : IDONTCARE system architecture for e-commerce The backend server use following: - Operating system Redhat 6 - Backend uses Apache Struts 2.3.10 as framework Database server is a mysql 5 Please answer the questions below: 1. Question 1: identify at least 4 vulnerabilities for IDONTCARE systems (2 for architectural view and 2 for non architectural view). You must explain and provide CVEs if applicable. (10 points) 2. Question 2: Identify 2 threats. You must explain and provide references to justify your point of view (10 points) 3. Question 3: Provide 2 business impact for the company concerned? (10 points) 4. Question 4: Provide two countermeasures to mitigate businesses impacts and threats (5 points) II. PART II : CRYPOGRAPHY 1. Hash (30 points) Consider the file hashefile.txt for the Hash exercise. For this exercise, we suggest to use certutil1 tool if you are using windows or md5sum and sha1sum, sha256sum in Linux. You can use other tools if you desire. For all your response, you must provide commands used and the output. a. Question 1 ▪ Provide the md5 hash of the file. (3 points) b. Question 2 ▪ Modify the file content and add just one character and provide a new md5 hash of the modified file. ▪ Do the output changed? Why? ( 3 points) c. Question 3 ▪ Provide the SHA1 of the modified file. (3 points) ▪ The hash is the same as which obtained in the previous question (question2) ? Why? (3 points) ▪ What you can conclude about the security of sha1 compared to md5? (3 points) d. Question 4 ▪ With the same modified file, provide sha256 hash. (4 points) ▪ Is the new hash longer or sorter ? Why? (4 points) ▪ What you can conclude about the security of sha256 compared to sha1? (2 points) e. Question 5 (5 points) Find 2 protocols where hashing algorithms are used and explain how algorithms are applied to secure the protocol. 2. RSA (35 points) a. Question 1 (10 points) If we choose p as 19 and q as 17, what would be the n, e and d? Show all your calculations. b. Question 2 (20 points) If we choose RSA to encrypt a message (“CMIS”) 1 https://portal.nutanix.com/page/documents/kbs/details?targetId=kA07V000000LWYqSAO o clearly show how the message will be encrypted by using the public key (n,e) and how the decryption will work by using the private key (n,d). You need to show all the steps for encryption and decryption. (15 points) You need also to provide the ciphertext obtained. (5 points) Message = CMIS E(Message) = CypherText D (CypherText) = Message c. Question 3 (5 points) Explain clearly and briefly, how RSA can defeat “man in the middle” attack. You can use the following scenario: Imagine a sender S wants to share a secret key K to the receiver R. What exactly the sender S has to send to the receiver R
Answered Same DayFeb 09, 2023

Answer To: I. PART I : IDENTIFY VULNERABILITIES, THREATS, IMPACTS (35 points) IDONTCARE is a popular company...

Aditi answered on Feb 09 2023
36 Votes
Assignment 1
I. PART I : IDENTIFY VULNERABILITIES, THREATS, IMPACTS (35 points)
IDONTCARE is a popular company doing e-commerce. They are located in a country where government is strict in protecting personal information’s. Any company which neglects its obligations of protection personal information pays a large fine which represents 30% of the turnover. System architecture is described through the figure 1.
Figure 1 : IDONTCARE system architecture for e-commerce The backend server use following:

· Operating system Redhat 6
· Backend uses Apache Struts 2.3.10 as framework Database server is a mysql 5
Please answer the questions below:
1. Question 1: identify at least 4 vulnerabilities for IDONTCARE systems (2 for architectural view and 2 for non architectural view). You must explain and provide CVEs if applicable. (10 points)
· https://access.redhat.com/documentation/en- us/red_hat_enterprise_linux/6/html/security_guide/sect-security_guide- security_threats
· The    First    problem    is    connecting    to    internet,    based    on    the www.marketing91.com/disadvantages-of-e-commerce/
· https://www.webdew.com/blog/e-commerce-website-design
1) Security Due to attacks by cybercriminals and hackers, online portals have received a lot of media attention. 
2) The availability of an internet connection is essential for e-commerce.
3) There is no chance of a tried-and-true product.
4) Delayed delivery
4) Delayed delivery
5) Lack of privacy, Tax difficulties, Legal Concerns, and the potential for Phishing are among the other issues.
· A flaw in Apache Struts has been found that might lead to remote code execution. An open - sourced framework called Apache Struts is used to create Java web applications. Remote code execution can be possible if this vulnerability is successfully exploited.
    
Access
    Vector
    Complexity
    Authentication
    
    NETWORK
    MEDIUM
    NONE
• One of the most widely used relational management systems available is called MySQL, and it is employed to store data for web servers and webpages. The majority of well-liked web servers and frameworks have MySQL as its default database.

In order to safeguard our data, MySQL has numerous vulnerabilities that we must be aware of. In this post, we will examine these various flaws and identify fixes.
2. Question 2: Identify 2 threats. You must explain and provide references to justify your point of view (10 points)
a) A successful hacker can get database records, add, change, and remove entries in the database, as well as access authenticated and permitted areas of a web web-based application or server.
b) Cross Site Scripting (XSS) - Client Hijacking: This attack takes advantage of a flaw in a website by inserting malicious programs that will execute on the client's end. The objective is to run a script that has been embedded in a website page of the a web app in the attacker's preferred pattern. Every time the website loads or when a connected event occurs, the code can be run.
3. Question 3: Provide 2 business impact for the company concerned? (10 points)
a) Remote A particularly special vulnerability known as remote preauth account enumeration only arises when user-generated inputs are not thoroughly checked before being submitted to the database query. This is a particular attack that aims to harm a remote user.
vulnerability for enumeration in the MySQL server database. The attacker's goal is to determine whether a specific user or username is genuine or already exists in your database, and then, using the produced error messages, to figure out a way around it in order access the user's sensitive information.
This flaw may be used by a malicious person to compile a list of legitimate usernames and obtain unapproved access to confidential information. A malicious user can thus verify if a certain username is being used by the SQL database instance using this vulnerability. If the account is invalid, it responds with "Access refused" error messages. If it produces a different answer, the attacker can verify that the user is indeed there. The following versions are affected by this vulnerability: Oracle MySQL versions prior to 5.6.19 and 5.5.38.
· To avoid this, you need to sanitize user–generated inputs and upgrade to later versions after the ones mentioned. https://www.securecoding.com/blog/top-5-mysql-vulnerabilities-and-how-to-fix- them/
b) Race Condition: When a system, device, or piece of software attempts to perform two or more installers, a race condition results. However, because of the nature of the device or system the operations should be executed in the correct order or timing due to the other unforeseen events to ensure that it is done effectively. In the case of MySQL, this flaw may result in a race situation, which may be quite harmful. It can enable a local user with database access to increase their privileges and execute any code under the guise of the data local user.
There is a race condition in Oracle MySQL versions prior to 5.5.52, 5.6.x prior to 5.6.33, 5.7.x prior to 5.7.15, 8.x...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here