99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫INFO3616、代做Python語言程序
代寫INFO3616、代做Python語言程序

時間:2024-08-29  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



The University of Sydney
School of Computer Science
Senior Lecturer - Security
INFO3616/CSEC3616/CSEC5616 — S2 2024
Assignment - 1
This is an individual assignment.
This assignment worths 10% of the final marks of the course.
Submit your final report as a PDF and codes as a zip file in Canvas.
You should explain any details of how to run your code in report.
Final Report and Code: Due by Week 5, Sunday the 1st of September, 2024 11:59 PM
*** IMPORTANT ***: In your answer sheet DO NOT repeat the questions. Simply include
the question number and your answer only. If you include question text in your answer sheet,
your TurnItIn score will be high and there will be additional checks. This will cause a delay in
releasing your marks. We will also impose a penalty of 10% of the total marks.
1 Security Goals (20 marks)
Analyse the following real-world IT-related incidents and data breaches where specific security goals
were compromised. For each scenario, identify the compromised security goal (e.g., Confidentiality,
Data/Message Integrity, Authenticity, Authorisation, Accountability, Non-repudiation, Deniability,
Availability, Privacy) and explain how the incident compromised that goal.
You will have to do your research by referring to various news articles and incident reports to
understand what happened in each incident. We have given some sample links to get you started but
feel free to investigate more and understand what happened in each incident. Most of the questions
will have more than one correct answer, depending on how you look at them. We will accept them if
your explanation is correct and related to the incident.
Provide clear and concise explanations for each scenario, as shown in the example.
Example 1 - CrowdStrike Falcon update failure 2024 - Link
Compromised Security goal: Availability
Explanation: Windows machines with the CrowdStrike Falcon Sensor installed went into
the boot loop with BSOD (Blue Screen of Death), making them unusable and compromising
availability.
1
Example 2 - Optus data breach 2022 - Link
Compromised Security goal: Confidentially
Explanation: Personal information of the Optus customers, such as driver’s licence number,
passport number, and address, was harvested by an attacker using an unauthenticated API
endpoint. Optus was in breach of keeping their customer’s data confidential. Here, arguments
can be made for security goals such as authorisation and privacy - but they are secondary to
confidentiality.
2 marks for each. 1 mark for correctly naming the security goal and one mark for the
explanation.
i Twitter account hijacking, 2020, Link.
ii Struxnet, 2010, Link.
iii Medicare and Pharmaceutical Benefits Scheme (PBS) data released by the Australian Department
of Health, 2016, Link 1, Link 2.
iv SolarWinds Supply Chain Attack, 2020, Link.
v Attack on Dyn DNS Provider, 2016 Link.
vi Poly Network Hack, 2021, Link 1, Link 2.
vii Silk Road Takedown, 2013, Link 1, Link 2.
viii Colonial Pipeline Cyberattack, 2021, Link.
ix Ashley Madison Breach, 2015, Link.
x Unisuper Google Could Incident, 2024, Link 1, Link 2, Link 3.
2 Social Engineering (20 marks)
ZenithTech, a prominent financial services firm, has been experiencing a surge in activity due to the
launch of a new investment platform. During this time, Sarah, an operations manager, receives a call
from someone claiming to be Chris, a representative from their external auditing firm. Shortly after,
she also receives an email supposedly from the company’s internal audit department.
Chris: "Hello Sarah, I’m Chris from your external audit firm. We’re conducting a quick review
of the new investment platform’s security protocols. Could you provide the access logs and system
architecture diagrams?”
Sarah: "I wasn’t aware of this audit. Shouldn’t this request come through our IT security team?”
Chris: "I understand your concern, Sarah. Due to the urgency of this review, we’ve been asked to
directly contact key personnel. I’ve already spoken to Michael from your internal audit team, and he’ll
send you an email confirming my request.”
2
Email:
Subject: Verification of External Auditor Request
Dear Sarah,
This is to verify that Chris is an authorized member of our external audit firm and is requesting
the necessary information for a security review. Please assist him with the requested documents.
Best regards,
Michael Johnson - Internal Audit Department
Later, Sarah discusses this situation with her colleague, James.
Sarah: "James, I got a call from an external auditor named Chris and an email from Michael
confirming it. But something doesn’t feel right. What do you think?”
James: "That’s odd. Did you verify the email’s authenticity? Maybe it’s best to check with Michael
directly.”
i Identify and describe two cognitive biases the attacker is attempting to exploit. (6 marks)
ii What additional indicators should Sarah look for to recognize this as a potential vishing attack?
List and explain two red flags. (4 marks)
iii As a security manager, what steps would you implement at ZenithTech to prevent such vishing
attempts? Provide two recommendations. (4 marks)
iv If Sarah had shared the sensitive information, what immediate actions should ZenithTech take to
mitigate potential risks? Explain three steps. (6 marks)
3 Social Engineering in Practice (20 marks)
You are a given a Twitter profile of a fictitious person.
https://x.com/frankgraphicsGP
Your task is to conduct some reconnaissance on the profile and guess the password used by this
subject to zip a file. Write a Python program that takes keyword list as the input create a list of
possible word combinations that may be used by this subject as a password.
For example, if you find possible keywords to be “blue”, “car”, the Python program should be able
to generate a list like and programmatically try to unzip the given file by entering generated passwords.
blue
car
blueblue
bluecar
carblue
carcar
3
Hint: The correct password contains lower case letters and digits. The length of the password is less
than 20 characters.
Include any details of how to run your code and the contents of the unzipped file in the PDF report
and submit your code in the code submission link given in Canvas.
4 Access Control (20 marks)
a) Definitions
i Explain: is authentication a necessary ingredient for authorisation? Give an example that proves
your argument. (2 marks)
ii It is conventional wisdom that passwords to encrypt a hard drive should be longer than passwords
for online login to websites. Explain why. (2 marks)
iii Explain what a Security Policy Model is. **2 sentences are enough. (2 marks)
iv Access control is often categorised into two general forms (which we called two ends of a spectrum).
What are they, and how are they different from each other? (2 marks)
v Modern CPUs have support for access control. Explain two key ideas of the common x86
architecture. (2 marks)
b) Security Policy Models
Figure 1 shows a mapping between users and clearances, and between required clearances and objects.
The clearance level increases as Basic, Confidential, Secret, Top Secret, and Ultimate Secret. Only
these mappings are defined; no other rule sets exist.
Explain if the the following statements are right or wrong, and say why.
i “In a Bell LaPadula model, Bob can read the file battle_plans.txt.” (2 marks)
ii “In a Biba model, Bob can read the file mars_habitat_plan.txt.” (2 marks)
iii “In a Bell LaPadula model, Alice can enlist the help of Elise to obtain the content of the
mars_habitat_plan.txt.” (2 marks)
iv “In a Bell LaPadula model, Alice can write to all the files as she wishes.” (2 marks)
v “In a Biba model, Elise can write to all the files as she wishes.” (2 marks)
4
ClearanceUser
BasicAlice
ConfidentialBob
SecretCharlie
Top SecretDavid
Ultimate SecretElise
Required ClearanceObject
Confidentialweekly_threat_report.txt
Ultimate Secretmars_habitat_plan.txt
Basicnext_week_press_brief.txt
Top Secretbattle_plans.txt
Figure 1: Access Tables
5 Linux Access Control (20 marks)
Below questions are associated with the provided Azure VM.
a) Basic Access Control
Below questions can be answers by Linux One liners. Provide the answer to each question and
include the command you used. Make sure that you include the command as letters/characters
(than screenshots/images), so that the markers can copy/paste command and check whether it is
working.
i What is the User ID (UID) of the user gimly. (1 mark)
ii What is the Group ID (GID) of the group hobbits. (1 mark)
iii Find which group the user legolas belongs to. (1 mark)
iv Find all the users in the group humans. (1 mark)
v Does the user frodo have sudo access? There are multiple ways to do this. Answers requiring
more than one command is also accepted. (1 mark)
b) File Permissions
For i-iii, use the linux find command with correct options and make sure that you command do not
generate any permission denied messages or other error messages. Include the commands you used in
your answer.
i Find all the files owned by user legolas. (1 mark)
ii Find all the files associated with the group elves. (1 mark)
iii Find all the files owned by user gimly. (1 mark)
iv In ii) you will find a file owned by legolas and having the group as elves. Is the next statement
is true about the file. “arwen can write to the file”. Explain your answer. (2 marks)
v In iii) you will find a file owned by gimly and having the group as dwarves. Is the next statement
is true about the file. “isildur can write to the file”. Explain your answer. (2 marks)
c) SUID Bit
5
i Find all the files own by root and having the group as humans. Similar to above your command
must not generate any permission denied messages or other error messages. (2 marks)
ii The search in i) will return two files. Explain the difference in permission strings of these two files.
(3 marks)
iii Explain and demonstrate how the permission setting in one of the files can create a security
vulnerability. (Hint: You will have to run the files and use the whoami command.) (3 marks)

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp




 

掃一掃在手機打開當前頁
  • 上一篇:代寫ECON0013、代做Python/c++語言程序
  • 下一篇:代寫COMP30026、C++設計程序代做
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                成人免费毛片a| 美女精品一区二区| 69久久99精品久久久久婷婷| 91在线观看下载| 国产成人av一区二区三区在线| 日本系列欧美系列| 日本欧美久久久久免费播放网| 亚洲一区视频在线| 午夜精品在线视频一区| 香港成人在线视频| 青青草原综合久久大伊人精品 | 国产精品不卡一区二区三区| 国产清纯白嫩初高生在线观看91 | 美女视频黄a大片欧美| 免费av成人在线| 国产永久精品大片wwwapp| 国产精品一区二区视频| 不卡一二三区首页| 色8久久精品久久久久久蜜| 欧美视频三区在线播放| 日韩欧美一区中文| 国产日韩视频一区二区三区| 中文字幕日韩一区二区| 亚洲狠狠爱一区二区三区| 久久精品国产色蜜蜜麻豆| 国产99一区视频免费| 丁香六月综合激情| 在线精品视频免费播放| 91精品黄色片免费大全| 26uuu国产日韩综合| 中文字幕一区二区三区视频| 亚洲国产成人av| 国产精品一区二区在线看| 97久久精品人人爽人人爽蜜臀| 欧美日韩亚洲不卡| 国产亚洲人成网站| 亚洲成av人片在线观看无码| 美女脱光内衣内裤视频久久网站 | 国产精品免费视频观看| 亚洲成人中文在线| 国产成人夜色高潮福利影视| 在线视频一区二区免费| 国产日韩精品一区二区三区| 午夜私人影院久久久久| 日韩国产高清在线| 国产精品18久久久久久久久| 丁香桃色午夜亚洲一区二区三区| 国产精品嫩草影院com| 亚洲色图另类专区| 亚洲h精品动漫在线观看| 国产综合一区二区| 欧美日韩高清在线| 国产精品久久久久久久久免费丝袜| 天天爽夜夜爽夜夜爽精品视频| 国产精品一级片在线观看| 精品视频一区二区三区免费| 亚洲欧洲色图综合| 国产经典欧美精品| 日韩欧美国产综合在线一区二区三区| 亚洲激情男女视频| av日韩在线网站| 中文字幕av免费专区久久| 国产一区欧美日韩| 欧美xxxxx牲另类人与| 五月婷婷激情综合| 欧洲精品在线观看| 亚洲精品中文在线观看| 不卡一区二区三区四区| 日本一区二区三区dvd视频在线| 久久精品久久综合| 日韩欧美亚洲一区二区| 午夜久久久久久电影| 欧美日韩国产首页| 午夜精品免费在线观看| 欧美午夜宅男影院| 亚洲第一精品在线| 欧美丝袜第三区| 亚洲综合免费观看高清在线观看| 色综合夜色一区| 精品一区二区三区免费毛片爱| 在线观看日韩电影| 中文字幕亚洲在| 国产精品美女久久久久高潮| 久久久不卡网国产精品一区| 欧美高清在线一区二区| 国产亲近乱来精品视频| 亚洲欧洲韩国日本视频| 日韩一区在线看| 久久久.com| 久久99精品久久久久久久久久久久| 看电视剧不卡顿的网站| 日韩女优电影在线观看| 韩国毛片一区二区三区| 国产性天天综合网| 中文字幕在线不卡一区二区三区| 91久久精品一区二区| 国产成人无遮挡在线视频| 99久久伊人精品| 666欧美在线视频| 尤物av一区二区| 99久久精品免费看国产| 日韩欧美国产wwwww| 亚洲欧美日韩国产综合| 日韩精品一区在线| 欧洲精品视频在线观看| 久久综合久久99| 日本不卡一二三区黄网| 99国产精品久久| 久久人人97超碰com| 亚洲小说春色综合另类电影| 国产·精品毛片| 国产一区二区0| 日韩一区在线播放| 亚洲综合久久av| 666欧美在线视频| 成人午夜av影视| 青青草97国产精品免费观看| 国产女人18水真多18精品一级做| 99精品视频一区二区三区| 丝袜美腿亚洲一区二区图片| 国产调教视频一区| 欧美日韩专区在线| 成人久久视频在线观看| 免费观看久久久4p| 亚洲免费成人av| 精品av久久707| 欧美视频你懂的| 成人爱爱电影网址| 久久99精品久久久久久| 亚洲一区二区三区影院| 国产精品乱码人人做人人爱| 欧美一区二区在线免费播放| 91色在线porny| 国产高清无密码一区二区三区| 亚洲永久精品大片| 国产精品毛片a∨一区二区三区| 日韩欧美激情在线| 欧美日本韩国一区二区三区视频| 波多野结衣视频一区| 狠狠色综合色综合网络| 日韩精品一二三区| 亚洲成人午夜影院| 亚洲精品亚洲人成人网在线播放| 欧美国产日韩亚洲一区| 国产亚洲欧美日韩在线一区| 精品日韩在线观看| 制服丝袜av成人在线看| 欧美日韩视频在线第一区| 91福利精品第一导航| av爱爱亚洲一区| 99视频热这里只有精品免费| 国产成人啪午夜精品网站男同| 捆绑调教美女网站视频一区| 日本在线不卡视频一二三区| 日韩中文字幕一区二区三区| 亚洲一区二区中文在线| 亚洲综合丁香婷婷六月香| 一区二区三区波多野结衣在线观看 | 日韩电影网1区2区| 无码av免费一区二区三区试看| 亚洲精品菠萝久久久久久久| 最新国产の精品合集bt伙计| 国产精品免费视频一区| 亚洲欧洲在线观看av| 国产精品成人一区二区艾草| 成人欧美一区二区三区在线播放| 国产精品久久看| 亚洲欧美乱综合| 亚洲一区二区三区视频在线| 午夜久久久久久久久| 蜜臀av一区二区在线观看| 经典一区二区三区| 成人激情视频网站| 日本伦理一区二区| 欧美一区永久视频免费观看| 2024国产精品| 一区在线播放视频| 亚洲福利视频一区二区| 蜜臀91精品一区二区三区| 国产乱人伦精品一区二区在线观看| 福利一区在线观看| 欧洲av一区二区嗯嗯嗯啊| 欧美一区二区视频网站| 亚洲精品一线二线三线无人区| 国产精品色哟哟网站| 亚洲影院免费观看| 久久不见久久见免费视频1| 丰满少妇久久久久久久| 欧美午夜精品一区二区蜜桃| 日韩美女视频一区二区在线观看| 国产拍欧美日韩视频二区| 一区二区三区成人在线视频| 奇米色一区二区| 国产精品99久久久久久似苏梦涵| 91麻豆6部合集magnet| 欧美丝袜丝交足nylons图片| 久久亚洲捆绑美女| 亚洲一区二区成人在线观看| 国产伦精一区二区三区| 日本高清免费不卡视频|