Question 1:
Consider an automated teller machine (ATM) in which users provide a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system. In each case, indicate the degree of importance of the requirement.
Question 2
In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:
Which attack(s) can be prevented by the "Peer entity authentication" security service?
- Release of message contents
- Traffic analysis
- Masquerade
- Replay
- Modification of messages
- Denial of service
Question 3
In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:
Which attack(s) can be prevented by the "Data origin authentication" security service?
- Release of message contents
- Traffic analysis
- Masquerade
- Replay
- Modification of messages
- Denial of service
Question 4
In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:
Which attack(s) can be prevented by the "Access Control" security service?
- Release of message contents
- Traffic analysis
- Masquerade
- Replay
- Modification of messages
- Denial of service
Question 5
In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:
Which attack(s) can be prevented by the "Confidentiality" security service?
- Release of message contents
- Traffic analysis
- Masquerade
- Replay
- Modification of messages
- Denial of service
Question 6
In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:
Which attack(s) can be prevented by the "Traffic flow confidentiality" security service?
- Release of message contents
- Traffic analysis
- Masquerade
- Replay
- Modification of messages
- Denial of service
Question 7
In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:
Which attack(s) can be prevented by the "Connection-Oriented Data Integrity" security service?
- Release of message contents
- Traffic analysis
- Masquerade
- Replay
- Modification of messages
- Denial of service
Question 8
In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:
Which attack(s) can be prevented by the "Non-repudiation" security service?
- Release of message contents
- Traffic analysis
- Masquerade
- Replay
- Modification of messages
- Denial of service
Question 9
In order to draw a matrix similar to the table presented in class that shows the relationship between security services and attacks, answer the following question:
Which attack(s) can be prevented by the "Availability" security service?
- Release of message contents
- Traffic analysis
- Masquerade
- Replay
- Modification of messages
- Denial of service