国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫INFO3616、代做Python語言程序
代寫INFO3616、代做Python語言程序

時間:2024-08-29  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



The University of Sydney
School of Computer Science
Senior Lecturer - Security
INFO3616/CSEC3616/CSEC5616 — S2 2024
Assignment - 1
This is an individual assignment.
This assignment worths 10% of the final marks of the course.
Submit your final report as a PDF and codes as a zip file in Canvas.
You should explain any details of how to run your code in report.
Final Report and Code: Due by Week 5, Sunday the 1st of September, 2024 11:59 PM
*** IMPORTANT ***: In your answer sheet DO NOT repeat the questions. Simply include
the question number and your answer only. If you include question text in your answer sheet,
your TurnItIn score will be high and there will be additional checks. This will cause a delay in
releasing your marks. We will also impose a penalty of 10% of the total marks.
1 Security Goals (20 marks)
Analyse the following real-world IT-related incidents and data breaches where specific security goals
were compromised. For each scenario, identify the compromised security goal (e.g., Confidentiality,
Data/Message Integrity, Authenticity, Authorisation, Accountability, Non-repudiation, Deniability,
Availability, Privacy) and explain how the incident compromised that goal.
You will have to do your research by referring to various news articles and incident reports to
understand what happened in each incident. We have given some sample links to get you started but
feel free to investigate more and understand what happened in each incident. Most of the questions
will have more than one correct answer, depending on how you look at them. We will accept them if
your explanation is correct and related to the incident.
Provide clear and concise explanations for each scenario, as shown in the example.
Example 1 - CrowdStrike Falcon update failure 2024 - Link
Compromised Security goal: Availability
Explanation: Windows machines with the CrowdStrike Falcon Sensor installed went into
the boot loop with BSOD (Blue Screen of Death), making them unusable and compromising
availability.
1
Example 2 - Optus data breach 2022 - Link
Compromised Security goal: Confidentially
Explanation: Personal information of the Optus customers, such as driver’s licence number,
passport number, and address, was harvested by an attacker using an unauthenticated API
endpoint. Optus was in breach of keeping their customer’s data confidential. Here, arguments
can be made for security goals such as authorisation and privacy - but they are secondary to
confidentiality.
2 marks for each. 1 mark for correctly naming the security goal and one mark for the
explanation.
i Twitter account hijacking, 2020, Link.
ii Struxnet, 2010, Link.
iii Medicare and Pharmaceutical Benefits Scheme (PBS) data released by the Australian Department
of Health, 2016, Link 1, Link 2.
iv SolarWinds Supply Chain Attack, 2020, Link.
v Attack on Dyn DNS Provider, 2016 Link.
vi Poly Network Hack, 2021, Link 1, Link 2.
vii Silk Road Takedown, 2013, Link 1, Link 2.
viii Colonial Pipeline Cyberattack, 2021, Link.
ix Ashley Madison Breach, 2015, Link.
x Unisuper Google Could Incident, 2024, Link 1, Link 2, Link 3.
2 Social Engineering (20 marks)
ZenithTech, a prominent financial services firm, has been experiencing a surge in activity due to the
launch of a new investment platform. During this time, Sarah, an operations manager, receives a call
from someone claiming to be Chris, a representative from their external auditing firm. Shortly after,
she also receives an email supposedly from the company’s internal audit department.
Chris: "Hello Sarah, I’m Chris from your external audit firm. We’re conducting a quick review
of the new investment platform’s security protocols. Could you provide the access logs and system
architecture diagrams?”
Sarah: "I wasn’t aware of this audit. Shouldn’t this request come through our IT security team?”
Chris: "I understand your concern, Sarah. Due to the urgency of this review, we’ve been asked to
directly contact key personnel. I’ve already spoken to Michael from your internal audit team, and he’ll
send you an email confirming my request.”
2
Email:
Subject: Verification of External Auditor Request
Dear Sarah,
This is to verify that Chris is an authorized member of our external audit firm and is requesting
the necessary information for a security review. Please assist him with the requested documents.
Best regards,
Michael Johnson - Internal Audit Department
Later, Sarah discusses this situation with her colleague, James.
Sarah: "James, I got a call from an external auditor named Chris and an email from Michael
confirming it. But something doesn’t feel right. What do you think?”
James: "That’s odd. Did you verify the email’s authenticity? Maybe it’s best to check with Michael
directly.”
i Identify and describe two cognitive biases the attacker is attempting to exploit. (6 marks)
ii What additional indicators should Sarah look for to recognize this as a potential vishing attack?
List and explain two red flags. (4 marks)
iii As a security manager, what steps would you implement at ZenithTech to prevent such vishing
attempts? Provide two recommendations. (4 marks)
iv If Sarah had shared the sensitive information, what immediate actions should ZenithTech take to
mitigate potential risks? Explain three steps. (6 marks)
3 Social Engineering in Practice (20 marks)
You are a given a Twitter profile of a fictitious person.
https://x.com/frankgraphicsGP
Your task is to conduct some reconnaissance on the profile and guess the password used by this
subject to zip a file. Write a Python program that takes keyword list as the input create a list of
possible word combinations that may be used by this subject as a password.
For example, if you find possible keywords to be “blue”, “car”, the Python program should be able
to generate a list like and programmatically try to unzip the given file by entering generated passwords.
blue
car
blueblue
bluecar
carblue
carcar
3
Hint: The correct password contains lower case letters and digits. The length of the password is less
than 20 characters.
Include any details of how to run your code and the contents of the unzipped file in the PDF report
and submit your code in the code submission link given in Canvas.
4 Access Control (20 marks)
a) Definitions
i Explain: is authentication a necessary ingredient for authorisation? Give an example that proves
your argument. (2 marks)
ii It is conventional wisdom that passwords to encrypt a hard drive should be longer than passwords
for online login to websites. Explain why. (2 marks)
iii Explain what a Security Policy Model is. **2 sentences are enough. (2 marks)
iv Access control is often categorised into two general forms (which we called two ends of a spectrum).
What are they, and how are they different from each other? (2 marks)
v Modern CPUs have support for access control. Explain two key ideas of the common x86
architecture. (2 marks)
b) Security Policy Models
Figure 1 shows a mapping between users and clearances, and between required clearances and objects.
The clearance level increases as Basic, Confidential, Secret, Top Secret, and Ultimate Secret. Only
these mappings are defined; no other rule sets exist.
Explain if the the following statements are right or wrong, and say why.
i “In a Bell LaPadula model, Bob can read the file battle_plans.txt.” (2 marks)
ii “In a Biba model, Bob can read the file mars_habitat_plan.txt.” (2 marks)
iii “In a Bell LaPadula model, Alice can enlist the help of Elise to obtain the content of the
mars_habitat_plan.txt.” (2 marks)
iv “In a Bell LaPadula model, Alice can write to all the files as she wishes.” (2 marks)
v “In a Biba model, Elise can write to all the files as she wishes.” (2 marks)
4
ClearanceUser
BasicAlice
ConfidentialBob
SecretCharlie
Top SecretDavid
Ultimate SecretElise
Required ClearanceObject
Confidentialweekly_threat_report.txt
Ultimate Secretmars_habitat_plan.txt
Basicnext_week_press_brief.txt
Top Secretbattle_plans.txt
Figure 1: Access Tables
5 Linux Access Control (20 marks)
Below questions are associated with the provided Azure VM.
a) Basic Access Control
Below questions can be answers by Linux One liners. Provide the answer to each question and
include the command you used. Make sure that you include the command as letters/characters
(than screenshots/images), so that the markers can copy/paste command and check whether it is
working.
i What is the User ID (UID) of the user gimly. (1 mark)
ii What is the Group ID (GID) of the group hobbits. (1 mark)
iii Find which group the user legolas belongs to. (1 mark)
iv Find all the users in the group humans. (1 mark)
v Does the user frodo have sudo access? There are multiple ways to do this. Answers requiring
more than one command is also accepted. (1 mark)
b) File Permissions
For i-iii, use the linux find command with correct options and make sure that you command do not
generate any permission denied messages or other error messages. Include the commands you used in
your answer.
i Find all the files owned by user legolas. (1 mark)
ii Find all the files associated with the group elves. (1 mark)
iii Find all the files owned by user gimly. (1 mark)
iv In ii) you will find a file owned by legolas and having the group as elves. Is the next statement
is true about the file. “arwen can write to the file”. Explain your answer. (2 marks)
v In iii) you will find a file owned by gimly and having the group as dwarves. Is the next statement
is true about the file. “isildur can write to the file”. Explain your answer. (2 marks)
c) SUID Bit
5
i Find all the files own by root and having the group as humans. Similar to above your command
must not generate any permission denied messages or other error messages. (2 marks)
ii The search in i) will return two files. Explain the difference in permission strings of these two files.
(3 marks)
iii Explain and demonstrate how the permission setting in one of the files can create a security
vulnerability. (Hint: You will have to run the files and use the whoami command.) (3 marks)

請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp




 

掃一掃在手機打開當前頁
  • 上一篇:代寫ECON0013、代做Python/c++語言程序
  • 下一篇:代寫COMP30026、C++設計程序代做
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務 管路流場仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務 管路
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真技術服務
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲勞振動
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲
    流體cfd仿真分析服務 7類仿真分析代做服務40個行業
    流體cfd仿真分析服務 7類仿真分析代做服務4
    超全面的拼多多電商運營技巧,多多開團助手,多多出評軟件徽y1698861
    超全面的拼多多電商運營技巧,多多開團助手
    CAE有限元仿真分析團隊,2026仿真代做咨詢服務平臺
    CAE有限元仿真分析團隊,2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗證碼 寵物飼養 十大衛浴品牌排行 suno 豆包網頁版入口 wps 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    国产玖玖精品视频| 一区精品在线| 久久精品国产一区| 欧美精品999| 欧美视频在线观看视频| 国产精彩免费视频| 久久99亚洲热视| 欧美亚洲国产视频小说| 国产成人在线亚洲欧美| 亚洲精品无码久久久久久| 欧美久久久久久一卡四| 久久国产精品网| 无码人妻精品一区二区蜜桃百度 | 国产一区二区在线视频播放| 久久久久久久久久久久久国产精品| 亚洲在线免费视频| 国产美女在线精品免费观看| 国产精品久久久久久久av电影| 欧美中文字幕在线观看| 久久久999视频| 痴汉一区二区三区| 91av在线网站| 亚洲综合在线播放| 高清一区二区三区日本久| 另类天堂视频在线观看| 国产欧美一区二区三区在线看| 国产精品日韩二区| 欧美人与性禽动交精品| 精品国产视频在线| 日韩精品在线视频免费观看| 国产二区视频在线| 无码少妇一区二区三区芒果| 91久久偷偷做嫩草影院| 午夜在线视频免费观看| 久久天天狠狠| 日韩视频第二页| xxx一区二区| 国内精品久久久| 精品国产综合区久久久久久| 国产精品亚洲片夜色在线| 中文字幕中文字幕在线中心一区 | 91精品久久久久久久久青青| 亚洲色欲综合一区二区三区| 91国产在线精品| 日韩av免费一区| 色妞色视频一区二区三区四区| 日本高清不卡在线| 国产精品三级网站| 国产亚洲欧美一区二区| 亚洲日本一区二区三区在线不卡| 国产精品88a∨| 日韩视频免费播放| 国产精品青青草| 国产另类第一区| 日本精品va在线观看| 国产精品免费一区二区三区在线观看| 国产一级做a爰片久久毛片男| 亚洲综合五月天| 久久久久久久久久久成人| 国产一区二区三区高清| 亚洲欧洲在线一区| 久久久久久免费看| 国产亚洲福利社区| 一本色道婷婷久久欧美| 久久久久久久久久码影片| 精品一区二区三区视频日产| 亚洲xxxx做受欧美| 国产精品视频26uuu| 99在线热播| 欧美自拍大量在线观看| 久久久久久国产| 色噜噜亚洲精品中文字幕| 国产毛片久久久久久国产毛片| 日韩av片免费在线观看| 欧美日本精品在线| 北条麻妃久久精品| 91国产中文字幕| 国产欧美日韩综合一区在线观看| 日本欧美色综合网站免费| 久久成人精品电影| 日韩中文字幕在线精品| 91精品国产综合久久香蕉的用户体验| 欧美精品在线一区| 亚洲精品成人a8198a| 国产精品美乳在线观看| 国产成人高潮免费观看精品| 国产日韩精品推荐| 欧美做暖暖视频| 亚洲 欧美 日韩 国产综合 在线| 久久成人精品视频| 日韩视频一区在线| 久久伦理网站| 成人av在线网址| 欧美日韩亚洲一| 亚洲一区免费网站| 久久在线免费观看视频| 国产不卡一区二区视频| 97精品国产91久久久久久| 国产在线视频不卡| 女同一区二区| 日韩精品综合在线| 日韩专区第三页| 亚洲精品电影在线一区| 中文视频一区视频二区视频三区| 国产精品日韩专区| 国产成人精品一区二区| 国产av无码专区亚洲精品| 77777亚洲午夜久久多人| 国产一区二区三区四区五区加勒比 | 国产精品久久久久9999小说| 久久久久久久少妇| 国产精品88久久久久久妇女| 91精品国自产在线观看| 成年人网站国产| 国产在线一区二区三区欧美| 欧美精品色婷婷五月综合| 日韩av第一页| 亚洲国产婷婷香蕉久久久久久99| 欧美精品久久久久久久| 久久99热这里只有精品国产| 久久国产精品久久久| 久久的精品视频| 精品产品国产在线不卡| 欧美精品日韩三级| 久久国产精品偷| 久久中文字幕一区| 精品久久久久久无码中文野结衣| 成人444kkkk在线观看| 国产精品久久久久久久app| 日韩在线播放视频| 精品国产一区久久久| 国产成人精品一区二区三区福利| 久久精品国产亚洲| 国产精品久久久影院| 国产精品久久久久久av福利软件 | 91精品国产成人| 久久久亚洲欧洲日产国码aⅴ| 81精品国产乱码久久久久久| 久久久一二三四| 国产z一区二区三区| 久久久综合香蕉尹人综合网| 日韩亚洲综合在线| 国产精品日本一区二区| 久久这里有精品视频| 一区二区三视频| 手机在线观看国产精品| 人人妻人人澡人人爽欧美一区双| 欧美中文娱乐网| 黄色片视频在线播放| 国产深夜男女无套内射| 成人av一级片| 国产成人精品a视频一区www| 国产成人精品一区二区| 国产精品国产对白熟妇| 亚洲一区三区在线观看| 欧美一区二区三区在线播放| 欧美乱大交xxxxx潮喷l头像 | 在线一区亚洲| 日韩在线视频在线观看| 青青草视频在线免费播放| 免费国产成人看片在线| 国产精品伊人日日| 久久精品magnetxturnbtih| 国产精品裸体一区二区三区| 国产99久久精品一区二区 夜夜躁日日躁| 一区二区不卡在线视频 午夜欧美不卡'| 午夜久久久久久久久久久| 免费中文日韩| 国产欧美精品一区二区三区介绍 | 国产精品黄页免费高清在线观看| 一本一生久久a久久精品综合蜜| 懂色av粉嫩av蜜臀av| 欧美 日韩 国产在线| 99久久免费观看| 精品国产欧美一区二区三区成人| 一区二区三区日韩视频| 欧洲美女7788成人免费视频| 高清亚洲成在人网站天堂| 久久久久国产精品视频| 国产精品成人久久电影| 岛国视频一区免费观看| 国产一区不卡在线观看| …久久精品99久久香蕉国产| 国产精品啪啪啪视频| 性欧美在线看片a免费观看| 国内精品**久久毛片app| 久久久久福利视频| 国产99久久精品一区二区 夜夜躁日日躁 | 国产精品户外野外| 日产国产精品精品a∨| 国产片侵犯亲女视频播放| 国产成人亚洲欧美| 一区高清视频| 蜜桃传媒一区二区| 久久久久久久久综合| 亚洲精品高清视频| 国产一区二区视频在线观看| 九九久久99| 污视频在线免费观看一区二区三区| 国产在线播放一区二区|