1.1) Computer threats categories 2
This attack covers: 2
2.) Bob signs up for internet banking. 3
2.1) how the security scheme works 3
2.2) is it secure against dongle theft 3
2.3) if safe from eavesdropping, does this eliminate need for dongle 3
2.4) the cryptographic primitives used 3
2.5) purpose of the serial number 3
2.6) does the serial number need to be randomly generated 3
Computer security and protecting our systems 4
1.1) Computer threats categories
This attack covers:
i) Deliberate acts are the main threat category for this type of attack because the hacker is deliberately trying to cause ...view middle of the document...
2.3) if safe from eavesdropping, does this eliminate need for dongle
3. Yes, security token, along with Bob’s PIN number helps to authenticate Bob as Bob. Even if a secure channel exists the bank has no way of verifying the person using the secure channel is indeed Bob.
2.4) the cryptographic primitives used
4. A stream cipher is used in this scheme. The same cipher is used on both the security token and the authentication server.
2.5) purpose of the serial number
5. The serial number serves to identify the secret stream cipher key of each authentication token.
2.6) does the serial number need to be randomly generated
6. The serial number does not need to be random as it reveals no information about the key (which should be random). It merely serves as an identiﬁer so it only needs to be unique. As a result, it also does not need to be kept secret. It serves no purpose after the token has been activated.
Computer security and protecting our systems
As computers have become a big part of our daily lives, they have become our main source of communications and transactions, they have in return opened a gap for treats thus in turn reason for us to protect our information and systems.
We have now under circumstances been required to set passwords to our computers, phones and other systems to insure that we do not have any unauthorized personal, we have been forced to create passwords so long and complicated that sometimes they even confuse us, the very own people who set them. Then have to go through long tedious recovery processes when we have forgotten them. Passwords are safe...