加勒比久久综合,国产精品伦一区二区,66精品视频在线观看,一区二区电影

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

代寫INFO3616、代做Python語言程序
代寫INFO3616、代做Python語言程序

時間:2024-08-29  來源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯



The University of Sydney
School of Computer Science
Senior Lecturer - Security
INFO3616/CSEC3616/CSEC5616 — S2 2024
Assignment - 1
This is an individual assignment.
This assignment worths 10% of the final marks of the course.
Submit your final report as a PDF and codes as a zip file in Canvas.
You should explain any details of how to run your code in report.
Final Report and Code: Due by Week 5, Sunday the 1st of September, 2024 11:59 PM
*** IMPORTANT ***: In your answer sheet DO NOT repeat the questions. Simply include
the question number and your answer only. If you include question text in your answer sheet,
your TurnItIn score will be high and there will be additional checks. This will cause a delay in
releasing your marks. We will also impose a penalty of 10% of the total marks.
1 Security Goals (20 marks)
Analyse the following real-world IT-related incidents and data breaches where specific security goals
were compromised. For each scenario, identify the compromised security goal (e.g., Confidentiality,
Data/Message Integrity, Authenticity, Authorisation, Accountability, Non-repudiation, Deniability,
Availability, Privacy) and explain how the incident compromised that goal.
You will have to do your research by referring to various news articles and incident reports to
understand what happened in each incident. We have given some sample links to get you started but
feel free to investigate more and understand what happened in each incident. Most of the questions
will have more than one correct answer, depending on how you look at them. We will accept them if
your explanation is correct and related to the incident.
Provide clear and concise explanations for each scenario, as shown in the example.
Example 1 - CrowdStrike Falcon update failure 2024 - Link
Compromised Security goal: Availability
Explanation: Windows machines with the CrowdStrike Falcon Sensor installed went into
the boot loop with BSOD (Blue Screen of Death), making them unusable and compromising
availability.
1
Example 2 - Optus data breach 2022 - Link
Compromised Security goal: Confidentially
Explanation: Personal information of the Optus customers, such as driver’s licence number,
passport number, and address, was harvested by an attacker using an unauthenticated API
endpoint. Optus was in breach of keeping their customer’s data confidential. Here, arguments
can be made for security goals such as authorisation and privacy - but they are secondary to
confidentiality.
2 marks for each. 1 mark for correctly naming the security goal and one mark for the
explanation.
i Twitter account hijacking, 2020, Link.
ii Struxnet, 2010, Link.
iii Medicare and Pharmaceutical Benefits Scheme (PBS) data released by the Australian Department
of Health, 2016, Link 1, Link 2.
iv SolarWinds Supply Chain Attack, 2020, Link.
v Attack on Dyn DNS Provider, 2016 Link.
vi Poly Network Hack, 2021, Link 1, Link 2.
vii Silk Road Takedown, 2013, Link 1, Link 2.
viii Colonial Pipeline Cyberattack, 2021, Link.
ix Ashley Madison Breach, 2015, Link.
x Unisuper Google Could Incident, 2024, Link 1, Link 2, Link 3.
2 Social Engineering (20 marks)
ZenithTech, a prominent financial services firm, has been experiencing a surge in activity due to the
launch of a new investment platform. During this time, Sarah, an operations manager, receives a call
from someone claiming to be Chris, a representative from their external auditing firm. Shortly after,
she also receives an email supposedly from the company’s internal audit department.
Chris: "Hello Sarah, I’m Chris from your external audit firm. We’re conducting a quick review
of the new investment platform’s security protocols. Could you provide the access logs and system
architecture diagrams?”
Sarah: "I wasn’t aware of this audit. Shouldn’t this request come through our IT security team?”
Chris: "I understand your concern, Sarah. Due to the urgency of this review, we’ve been asked to
directly contact key personnel. I’ve already spoken to Michael from your internal audit team, and he’ll
send you an email confirming my request.”
2
Email:
Subject: Verification of External Auditor Request
Dear Sarah,
This is to verify that Chris is an authorized member of our external audit firm and is requesting
the necessary information for a security review. Please assist him with the requested documents.
Best regards,
Michael Johnson - Internal Audit Department
Later, Sarah discusses this situation with her colleague, James.
Sarah: "James, I got a call from an external auditor named Chris and an email from Michael
confirming it. But something doesn’t feel right. What do you think?”
James: "That’s odd. Did you verify the email’s authenticity? Maybe it’s best to check with Michael
directly.”
i Identify and describe two cognitive biases the attacker is attempting to exploit. (6 marks)
ii What additional indicators should Sarah look for to recognize this as a potential vishing attack?
List and explain two red flags. (4 marks)
iii As a security manager, what steps would you implement at ZenithTech to prevent such vishing
attempts? Provide two recommendations. (4 marks)
iv If Sarah had shared the sensitive information, what immediate actions should ZenithTech take to
mitigate potential risks? Explain three steps. (6 marks)
3 Social Engineering in Practice (20 marks)
You are a given a Twitter profile of a fictitious person.
https://x.com/frankgraphicsGP
Your task is to conduct some reconnaissance on the profile and guess the password used by this
subject to zip a file. Write a Python program that takes keyword list as the input create a list of
possible word combinations that may be used by this subject as a password.
For example, if you find possible keywords to be “blue”, “car”, the Python program should be able
to generate a list like and programmatically try to unzip the given file by entering generated passwords.
blue
car
blueblue
bluecar
carblue
carcar
3
Hint: The correct password contains lower case letters and digits. The length of the password is less
than 20 characters.
Include any details of how to run your code and the contents of the unzipped file in the PDF report
and submit your code in the code submission link given in Canvas.
4 Access Control (20 marks)
a) Definitions
i Explain: is authentication a necessary ingredient for authorisation? Give an example that proves
your argument. (2 marks)
ii It is conventional wisdom that passwords to encrypt a hard drive should be longer than passwords
for online login to websites. Explain why. (2 marks)
iii Explain what a Security Policy Model is. **2 sentences are enough. (2 marks)
iv Access control is often categorised into two general forms (which we called two ends of a spectrum).
What are they, and how are they different from each other? (2 marks)
v Modern CPUs have support for access control. Explain two key ideas of the common x86
architecture. (2 marks)
b) Security Policy Models
Figure 1 shows a mapping between users and clearances, and between required clearances and objects.
The clearance level increases as Basic, Confidential, Secret, Top Secret, and Ultimate Secret. Only
these mappings are defined; no other rule sets exist.
Explain if the the following statements are right or wrong, and say why.
i “In a Bell LaPadula model, Bob can read the file battle_plans.txt.” (2 marks)
ii “In a Biba model, Bob can read the file mars_habitat_plan.txt.” (2 marks)
iii “In a Bell LaPadula model, Alice can enlist the help of Elise to obtain the content of the
mars_habitat_plan.txt.” (2 marks)
iv “In a Bell LaPadula model, Alice can write to all the files as she wishes.” (2 marks)
v “In a Biba model, Elise can write to all the files as she wishes.” (2 marks)
4
ClearanceUser
BasicAlice
ConfidentialBob
SecretCharlie
Top SecretDavid
Ultimate SecretElise
Required ClearanceObject
Confidentialweekly_threat_report.txt
Ultimate Secretmars_habitat_plan.txt
Basicnext_week_press_brief.txt
Top Secretbattle_plans.txt
Figure 1: Access Tables
5 Linux Access Control (20 marks)
Below questions are associated with the provided Azure VM.
a) Basic Access Control
Below questions can be answers by Linux One liners. Provide the answer to each question and
include the command you used. Make sure that you include the command as letters/characters
(than screenshots/images), so that the markers can copy/paste command and check whether it is
working.
i What is the User ID (UID) of the user gimly. (1 mark)
ii What is the Group ID (GID) of the group hobbits. (1 mark)
iii Find which group the user legolas belongs to. (1 mark)
iv Find all the users in the group humans. (1 mark)
v Does the user frodo have sudo access? There are multiple ways to do this. Answers requiring
more than one command is also accepted. (1 mark)
b) File Permissions
For i-iii, use the linux find command with correct options and make sure that you command do not
generate any permission denied messages or other error messages. Include the commands you used in
your answer.
i Find all the files owned by user legolas. (1 mark)
ii Find all the files associated with the group elves. (1 mark)
iii Find all the files owned by user gimly. (1 mark)
iv In ii) you will find a file owned by legolas and having the group as elves. Is the next statement
is true about the file. “arwen can write to the file”. Explain your answer. (2 marks)
v In iii) you will find a file owned by gimly and having the group as dwarves. Is the next statement
is true about the file. “isildur can write to the file”. Explain your answer. (2 marks)
c) SUID Bit
5
i Find all the files own by root and having the group as humans. Similar to above your command
must not generate any permission denied messages or other error messages. (2 marks)
ii The search in i) will return two files. Explain the difference in permission strings of these two files.
(3 marks)
iii Explain and demonstrate how the permission setting in one of the files can create a security
vulnerability. (Hint: You will have to run the files and use the whoami command.) (3 marks)

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp




 

掃一掃在手機打開當(dāng)前頁
  • 上一篇:代寫ECON0013、代做Python/c++語言程序
  • 下一篇:代寫COMP30026、C++設(shè)計程序代做
  • 無相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)/客戶要求/設(shè)計優(yōu)化
    有限元分析 CAE仿真分析服務(wù)-企業(yè)/產(chǎn)品研發(fā)
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計優(yōu)化
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計優(yōu)化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發(fā)動機性能
    挖掘機濾芯提升發(fā)動機性能
    海信羅馬假日洗衣機亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機亮相AWE 復(fù)古美學(xué)與現(xiàn)代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 目錄網(wǎng) 排行網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    美国毛片一区二区三区| 另类一区二区| 欧美精品国产白浆久久久久| 精品九九久久| 99伊人成综合| 人人狠狠综合久久亚洲婷婷| 欧美日本免费| 国产理论在线| 日韩一级精品| 91精品一区国产高清在线gif| 欧美日韩中出| 国产一区二区三区的电影| 日本欧美视频| 伊人精品在线| 色婷婷精品视频| 午夜精品影视国产一区在线麻豆| 一区二区福利| 五月天av在线| 蜜桃视频一区二区三区| 天天天综合网| 精品久久久久久久| 日韩在线观看一区二区三区| 欧美日本不卡高清| 午夜欧美精品久久久久久久| 日本电影久久久| 亚洲专区一区| 欧美a级片一区| 久久久成人网| 国产在线播放精品| 天堂久久av| 婷婷综合成人| 欧美三级一区| 亚洲精品伊人| 日韩高清不卡在线| 日韩三区四区| 日韩一区精品| 在线看片福利| 日产精品一区二区| 亚洲专区一区二区三区| 波多野结衣的一区二区三区| 日韩精品午夜| 成人自拍在线| 一区二区三区四区精品视频| 国产专区精品| 国产激情综合| 欧美激情麻豆| 91精品视频一区二区| 麻豆专区一区二区三区四区五区| 久久精品xxxxx| 欧美日韩破处视频| 青草综合视频| 丰满少妇一区| 久久精品三级| 国产欧美日韩一级| 亚洲区一区二| 国产成人久久精品一区二区三区| 综合激情婷婷| 国产欧美精品久久| 日韩av网站在线免费观看| 日韩成人午夜精品| 99re91这里只有精品| 大色综合视频网站在线播放| 成人综合久久| 欧美1区3d| 亚洲欧美成人| 欧美三级网站| 日本午夜免费一区二区| 久久中文字幕一区二区三区| 亚洲精品看片| 欧一区二区三区| 久久综合偷偷噜噜噜色| 欧美亚洲色图校园春色| 欧美一二区在线观看| 亚洲激情五月| 国产精品久久久久久久免费观看 | 米奇777超碰欧美日韩亚洲| 亚洲视频综合| 亚洲综合精品四区| 久久91导航| 亚洲区国产区| 久久av偷拍| 欧美日韩亚洲在线观看| 日韩一级免费| 免费一二一二在线视频| 欧美高清免费| 国产一区二区亚洲| 精品素人av| 亚洲一区欧美二区| 成人看片网站| 中文字幕一区二区三三| 亚洲1区在线| 天天做天天爱综合| 日韩欧美1区| 一区二区蜜桃| 久久精品亚洲成在人线av网址| 欧美 日韩 国产一区二区在线视频| 国产一级一区二区| 亚洲成人不卡| 中文在线日韩| 麻豆视频一区| 成人在线电影在线观看视频| 另类一区二区三区| 日韩电影免费一区| 婷婷综合亚洲| 天堂8中文在线最新版在线| 国内精品久久久久久久影视蜜臀| 精品视频成人| 国产毛片久久| 久久精品国产亚洲高清剧情介绍| 日本欧美韩国国产| 伊人成综合网| 欧美亚洲二区| 国产欧美88| 日本欧美在线观看| 三级久久三级久久久| 成人自拍在线| 国产极品在线观看| www.久久久久爱免| 久久精品亚洲人成影院| 波多野一区二区| 国产日产精品_国产精品毛片| 国内成人在线| 免费一级欧美在线观看视频| 日韩三级网址| 另类av一区二区| 亚洲三级毛片| 激情综合亚洲| 久久三级毛片| 免费观看成人www动漫视频| 国产精品vvv| 欧美日本成人| 国产免费成人| 欧美国产三区| 日韩一级精品| 99久久久国产| 午夜一区不卡| 伊人久久综合网另类网站| 成人动漫免费在线观看| 一区二区动漫| 美女少妇全过程你懂的久久| 精品国产美女a久久9999| 国产精品调教| 亚洲成人va| 精品一区二区男人吃奶| 欧美日韩精品一区二区三区视频| 在线日韩成人| 男女羞羞在线观看| 97人人澡人人爽91综合色| 成人小电影网站| 视频二区欧美| 在线观看精品| 久久精品电影| 国产欧美日韩一区二区三区在线| 91精品蜜臀一区二区三区在线| 成人国产一区| 欧美裸体在线版观看完整版| 亚洲毛片视频| 麻豆9191精品国产| 日韩08精品| 精品123区| 国产高清一区| 国产精品白丝久久av网站| 美女黄色成人网| 日韩电影在线一区二区| 色偷偷偷在线视频播放| 成人午夜国产| 久久久久高潮毛片免费全部播放| 最新日韩在线| 日产国产欧美视频一区精品| 欧美黄色网页| 亚洲午夜精品久久久久久app| 国产精品magnet| 色135综合网| 青青草97国产精品麻豆| 久久精品72免费观看| 在线精品国产| 成人在线超碰| 视频在线观看91| 日韩极品在线| 欧美在线一级| 国产婷婷精品| 福利欧美精品在线| 欧美天堂一区二区| 国产视频欧美| 三级欧美日韩| 日日骚欧美日韩| 成人影视亚洲图片在线| 精品国产aⅴ| 影音先锋日韩在线| 欧美aa视频| 欧美日韩激情在线一区二区三区| 日本三级久久| 久久精品久久精品| 免费看精品久久片| 99久久精品费精品国产| 国产欧美一区二区精品久久久| yw.尤物在线精品视频| 日韩视频不卡| 999国产精品| 日本中文字幕一区二区有限公司|