网络安全代写|英国代写


University of Exeter 埃克塞特大学

ECMM462 Fundamentals of Security

Background Story

You are programming a robot that helps hospital staff in carrying out some oftheir duties. The robot is required to visit the patient rooms and check whetherthe patient is present. If that is the case, the robot must ask the patient if theyhave taken their assigned medication. At the end of the visits, the robot reportsto the doctor which patients were not in the room, and which did not take theirmedication.Important NoteEvery implementation point described below is associated a number of marks. Inprevious years, we noticed that students frequently try to farm partial marks by writingsome amount of code for every section, even though none of it can even be executed.This is not the way to develop any complex system, and we intend to disincentivise it.For the reason described above, if a node implementing a piece of functionality doesnot execute, at most half the marks for that ROS node can be awarded. Marks arerounded up. Therefore, if an item is worth 5 marks, the most that a non-executablecode can get is 3.By non-executable, we mean that the code immediately terminates with an error dueto syntactic issues in the file, or wrong import statements. Runtime exceptions or bugsthat do not happen in the early stages of the execution will not be considered as non-executable, and therefore will not incur the penalty.Initialization• Create a package called "resit_coursework". Remember to maintain thecorrect dependencies in package.xml and CMakeLists.txt during development




Question 1

Determine whether each of the following propositions is true (T) or false (F):

(a) Computer security is the protection of the integrity, availability, and confidentiality of information system resources.

(b) Confidentiality is the protection of assets from unauthorized change.

(c) Confidentiality, availability, and integrity do not influence each other and can be viewed in isolation.

(d) A communication link is an example of an asset.

(e) Threats are attacks carried out.

(f) Threat agent is another term for attacker.

(g) A countermeasure can be devised to recover from a particular type of attack.

(h) A circumstance or event that interrupts or prevents the correct operation of system services and functions is also called deception.

(i) Obstruction leads to usurpation.

(j) Hardware is the most vulnerable to attack and the least susceptible to automated controls.

Note: For each answer you get 1.5 mark if it is correct, −0.5 marks if it is wrong, and 0 marks otherwise. You can never get less than 0 marks in total


Question 2

(a) Use Euler’s theorem to calculate the multiplicative inverse of 8 in mod 35.

(b) Briefly describe 2 possible ways to attack an RSA ciphertext and briefly explain why they are not feasible


Question 3

(a) Describe the concept of a Merkel structure.

• State its purpose

• State the requirement for the compression function

• State its guarantee for the composed function

(b) Assume the following scheme to provide message authentication using public key cryptography:

• The sender computes the hash value h(m) of the message.

• The sender sends the message m and an encrypted version of the hash value {h(m)}pr to the receiver. (Here pr denotes the senders private key).

• The receiver uses the public key of the sender to decrypt {h}pr .

• The receiver computes h(m) and compares it to h.

(i) Describe a possible attack on message integrity assuming that h is preimage resistant but not weak collision resistant and briefly justify

why it works.

(ii) Describe a possible attack on message integrity assuming that h is preimage resistant and weak collision resistant but not strong collision resistant and briefly justify why it works


Question 4

Consider the following datasets A and B.

In addition assume a mechanism K which returns the average weight of the people in the database (and 0 if the database is empty). For example K(A) = 161.7. Finally, assume that a person always weights between 0 and 450 lb. Answer each of the following questions and briefly justify your answer.

(a) Are the two datasets A and B neighbouring datasets?

(b) What is the sensitivity K?

(c) Does K satisfy 0.01-differential privacy?


咨询 Alpha 小助手,获取更多课业帮助