首页 > 科技
SEHS4515 Individual Assignment 2324s2 Page 1
SEHS4515 Computer Security
Individual Assignment
Due: 19 April 2024 (Friday) 6:00pm
Objectives
• To let students apply computer security concepts in real-life settings.
• To show students’ understanding of the requirements and technologies in
computer security.
Instructions
• This assignment should be completed individually and neatly.
• Plagiarism will be penalized severely. Marks will be deducted for assignments
that are plagiarized in whole or in part, regardless of the sources.
• Late submission is subject to mark deduction penalty.
• Answer ALL questions.
• Please state clearly your source of reference.
• You can attach your reference materials.
Submission
• Submit your work in softcopy before the due date.
• Save your work, or scan your handwritten work, into a PDF file. Use the file
name yourname_StudentID.pdf and submit it via Blackboard.
Grading Aspects
• Marks are given to the accuracy of both steps and answer. Detailed steps should
be provided.
• No mark would be given if your work is not readable (especially for handwritten
work) and/or the steps cannot be followed.
• Late submission will have mark deduction of 20% per day late, including Sunday
and public holiday. Late more than 4 days will not be accepted.
SEHS4515 Individual Assignment 2324s2 Page 2
Question 1 (25%)
Read the following article about “Travel agencies’ customer databases being hacked”:
https://www.pcpd.org.hk/english/enforcement/case_notes/casenotes_2.php?id=2018DB0
2&content_type=&content_nature=&msg_id2=545
(a) Analyze the possible threat(s), vulnerability(es) and risk(s) in the above case. (6%)
(b) Compare the attack in the article with WannaCry attack. (6%)
(c) What countermeasure(s) did the travel agency take? Briefly explain each of them.
(7%)
(d) Suppose the agency has approximately $413 million in annual revenue. There are two
incidents of such attack per year and each attack causes 10% drop of the annual
revenue. Perform a risk analysis and suggest an acceptable cost of mitigation service.
(6%)
Question 2 (25%)
(a) Suppose you are designing the public and private keys for RSA public-key encryption.
Given p=11 and q=23.
(i) If the public key is e=13, what is private key d? (5%)
(ii) A message m=7 is encrypted using the above RSA settings, what would be the
cipher text c? (5%)
(iii) A cipher text c=3 is decrypted using the above RSA settings, what would be the
plain text m? (5%)
(b) Calculate the multiplicative inverse of 31 mod 70 using the Extended Euclidean
Algorithm. (5%)
(c) Assume your HKID card number is made from the last six digits of your student ID
number. For example, if student ID = 12345678S, then HKID = S345678(*).
Calculate the check digital (*). (5%)
SEHS4515 Individual Assignment 2324s2 Page 3
Question 3 (20%)
Multi-factor authentication (MFA) is a method of computer access control in which a
user is granted access only after successfully presenting several separate pieces of
evidence an authentication mechanism.
(a) What is the meaning of “separate pieces of evidence”? (5%)
(b) Are username and password considered as two separate pieces of evidence? Justify
your answer. (5%)
(c) Perform a simple research from the Internet, what is the maximum number of factors
used in MFA can you find? Briefly explain each factor. (10%)
Question 4 (30%)
There are 12 types of malware listed in this website:
https://www.kaspersky.com/resource-center/threats/types-of-malware
For each type of malware, find out the following information.
(a) Their characteristics (12%)
(b) The way they spread (6%)
(c) The potential damages/negative effect they cause (12%)
- End of Assignment -
请加QQ:99515681 邮箱:99515681@qq.com WX:codinghelp
- 搜索
-
- 04-10重塑企业生产力!2025金智维企业级智能体暨AI+新品发布会成功举办,引领人机协同新范式
- 04-10数坤科技:引领医疗大模型全能时代
- 04-10“惊蛰号”——全球首艘内河全航程自动驾驶试验船顺利下水
- 04-10喜报丨易智瑞公司通过上海数据交易所数商资格认证
- 04-10打造酒业全面预算管理最佳实践,企云方助力金徽酒打造“数智化”全面预算平台
- 04-09安世亚太电力设备级数字孪生与AI虚拟传感解决方案
- 04-09铼赛智能Edge mini斩获2025法国设计大奖 | 重新定义数字化齿科美学
- 04-09口腔数字化大变革,这场行业大会带你率先把握未来机遇!
- 04-082025 年 Control4 中国区客户启动会在杭州成功举办,开启高端智能家居新征程
- 04-08多模态能力的进化,是AI眼镜成为生活必需品的关键