Assignment No. 02
Semester: Fall 2019
CS205: Information Security Total Marks: 15
Due Date: 28/11/2019
Please read the following instructions carefully before submitting assignment:
You need to use MS word document to prepare and submit the assignment on VU-LMS.
It should be clear that your assignment will not get any credit if:
The assignment is submitted after due date.
The assignment is not in the required format (doc or docx)
The submitted assignment does not open or file is corrupt.
Assignment is copied (partial or full) from any source (websites, forums, students, etc)
To enhance the learning capabilities of the students about:
- Software Attacks
- Need for Security against attacks
“Friend Circle” is a social media platform yet to be launched. Currently, it is in testing phase in which various security policies in the perspective of an online platform are being tested. Following are the reports / observations of such tests:
Upon testing the login interface, the security experts found a loophole in the system that an unauthorized person can login to the system by trying different combinations of passwords.
It is observed that bundle of unnecessary requests possibly generated by some computers or bots can overload the application and resultantly system may crash or fail to perform ordinary functions.
After carefully analyzing above mentioned reports, you are required to identify the type of attack associated with each report. Also mention one suitable solution to tackle the identified attack.
Carefully study the Topics “threat” and “software attacks” and identify the deliberate software attacks for following situations with proper justification.
- Suppose a user receives an email containing an image file as the attachment. As the user opens the file, different files on his systems get deleted or modified.
- A student copied some files from his USB flash drive to a computer in university lab. After doing this, he observed that the number of files on the system got duplicated and overall performance of the system got deteriorated. He faced too much delay in performing tasks by the computer.
- A user noticed that someone is using his Facebook account after stealing his credentials. After investigation, he observed that it happened after installing a software downloaded from an un-authentic website.