Friday, February 21, 2020
Computer Security Essay Example | Topics and Well Written Essays - 2000 words
Computer Security - Essay Example Characteristics of the attacker Motivation The motivation is to view encrypted files within the limited 9 daysââ¬â¢ time frame after which the information loses relevance to the attacker. Access The attacker has only access to physical location of the workstation though the time is limited to only 43 minutes. Skills and risk aversion The attacker is risk averse and has idea on file encryption techniques. The attacker is not mindful of the legal and ethical ramifications of the operation but he is not willing to attain his goal through violent means. Basic Attack tree Possible attacks Special Equipment Required Attack tree against AES Goal: Read a message encrypted with AES 1. Decrypt the message itself. (OR) 1.1. Break asymmetric encryption.(OR) 1.1.1. Brute-force breaks asymmetric encryption. (OR) 1.1.2. Mathematically break asymmetric encryption (OR) 1.1.2.1. Break RSA. (OR) 1.1.2.2. Factor RSA modulus/calculate AES discrete log. 1.1.3 Cryptanalyze asymmetric encryption 1.1.3.1. General cryptanalysis of RSA/ AES (OR) 1.1.3.2. Exploiting weakness in RSA/ AES. (OR) 1.1.3.3. Timing attacks on RSA/ AES. 1.2. Break symmetric-key encryption. (OR) 1.2.1. Brute-force break symmetric-key encryption. (OR) 1.2.2. Cryptanalysis of symmetric-key encryption. 2. ... 2.1.3. Have the file encrypted with a different public key in the background unknown to the owner. 2.2. Have the owner sign the encrypted symmetric key. (OR) 2.3. Monitor ownerââ¬â¢s computer memory. (OR) 2.4. Monitor other user back-up storage memory. (OR) 2.5. Determine the key from pseudorandom number generator. (OR) 2.5.1. Determine the state of randseed. Bin when the message was encrypted. (OR) 2.5.2. Implant software (virus) that deterministically alters the state of randseed.bin. (OR) 2.5.3. Implant the software that directly affects the choice of symmetric key. 2.6. Implant a virus that exposes the symmetric key. 3. Get owner to (help) decrypt message. (OR) 3.1. Chosen cipher text attack on symmetric key. (OR) 3.2. Chosen cipher text attack on public key. (OR) 3.3. Ghost the drives to an external storage medium. (OR) 3.4. Monitor outgoing data from the ownerââ¬â¢s computers through the network. (OR) 3.5. Intercept transferable data through the network (OR) 3.6. Read dec rypted intercepted file. 3.6.1. Copy the message from the ownerââ¬â¢s hard drive or virtual memory. (OR) 3.6.2. Copy the files from back-up media (OR) 3.6.3. Monitor network traffic. (OR) 3.6.4. Use electromagnetic snooping techniques to read files as they are displayed on the screen (OR) 3.6.5. Recover read message from print-out 4. Obtain private key from the owner 4.1. Factor RSA modulus/ calculate AES discrete log. (OR) 4.2. Get private key of owner. (OR) 4.2.1. Obtain encrypted owners private key ring. (OR) 4.2.1.1. Copy it from ownerââ¬â¢s hard drive. (OR) 4.2.1.2. Copy it from disk backups. (OR) 4.2.1.3. Monitor network traffic. (OR) 4.2.1.4. Implant virus or worm to expose copy of the encrypted private key. 4.2.2. Decrypt Private Key.
Wednesday, February 5, 2020
What are the ethics behind photojournalism and a real life newspaper Essay
What are the ethics behind photojournalism and a real life newspaper decision to print or not to print a photograph - Essay Example ââ¬Å"The production, presentation, and consumption of visual messages in all manner of media can be justifiably sliced in separate technological, historical, cultural and critical perspectives. The requirements for theory building at each stage are differentâ⬠(Elliott & Lester, 2002). And while it is recognized that ââ¬Å"Photography is the only ââ¬Ëlanguageââ¬â¢ understood in all parts of the world, and bridging all nations and culturesâ⬠(Helmut Gernsheim cited in Elliott & Lester, 2002), it is also acknowledged that ââ¬Å"photographs supply information without having a language of their own. Photographs quote rather than translate from realityâ⬠(John Berger cited in Elliott & Lester, 2002). The difficulty arises from the variety of social, political and cultural approaches that can be taken in the interpretation of an image. Added to this is the greater ability of photographers and photojournalists to manipulate images in many different ways as a means o f achieving the image sought. In determining the ethics involved in the decisions made by photojournalists and their editors regarding whether or not to print a particular image, then, it is necessary to take into consideration the ââ¬Å"intent of the image creator and the not-so-blank canvas of the image consumerâ⬠(Elliott & Lester, 2002) as these various approaches come into play. There have been many ethical theories proposed to serve as guidelines for the photojournalist and others regarding what types of images to display or not to display. There are six main theories that can, and should, be applied to photojournalism. These include the categorical imperative, utilitarianism, hedonism, the golden mean, the golden rule and the veil of ignorance. Categorical imperative, suggested by Immanuel Kant, refers to doing the right thing regardless of any extenuating
Subscribe to:
Posts (Atom)