CMP3750M讲解、辅导Cyber Security、辅导c/c++,Java,Python编程设计

- 首页 >> Algorithm 算法
END OF MODULE ASSESSMENT: In-Class Test
COLLEGE: Science
SCHOOL: School of Computer Science
MODULE: Cyber Security
MODULE CODE:CMP3750M
LEVEL: 3
DATE: May 2020
TIME ALLOWED: 2 Hours
INSTRUCTIONS TO STUDENTS:
QUESTIONS TO ANSWER: Answer ALL questions
MARKING SCHEME: Questions are individually weighted
MATERIALS PROVIDED: None
MATERIALS ALLOWED: Pen and Paper, PC
NOTES TO STUDENTS: Attempt all questions. Please write your answers on this answer file and submit the Supporting Documents on Blackboard. Once submitted you cannot change the file. This is a single submission only.
Do not use the Internet.
Once completed upload this document to Blackboard.

Part 1: Locating and interpreting log files
Log files are files used by computers to log events. Software programs, background processes, services, or transactions between services, including the operating system, generate these events. Log files are dependent on the application that generates them and is implemented by the software developer.
1.Identify the log files used for authentication.
What is the log file used for authentication?
______________________________________________ [2 Marks]

4.The output below is from a log file generated by an Apache web server.
[Wed Mar 22 11:23:12.207022 2017] [core:error] [pid 3548:tid 4682351596] [client 209.165.200.230] File does not exist: /var/www/apache/htdocs/favicon.ico

What information do the following identifiers provide?
Identifier Information provided
Timestamp
PID
Type
Client
Description[5 Marks]
Examine the output and describe what happened.[6 Marks]
Part 2: Setting file permissions
Permissions are the best internal method to prevent unauthorised access to end users. For example end users in marketing do not need access to finance. To facilitate this we can use permissions based on User, Group and Other. We can also set read, write and execute permissions for individual files.
1.Load the cybercops VM.
2.Load a terminal window.
3.Create a folder called inclass

What command can you use to create this folder? _________________________________________________ [2 Marks]

4.There are three files in the inclass folder called test1, test2, test3

5.Change the permissions for Test1 for the user and group to read, write and execute.
a. Explain how this was done and detail the command.[6 Marks]
b. What is the effect of these changes on the user and group?[4 Marks]
6.Change the permissions for Test2 for the group to read and write.
a. Explain how this was done and detail the command.[6 Marks]

b. What is the effect of these changes on the user? [4 Marks]

7.Take away all permissions for Test3 for Other.
Explain how this was done.[3 Marks]

8.Convert the following file permissions into letter representation.

Numeric Permissions
Part 3: Construct ACL’s to meet a given scenario
Access Control Lists are key security elements designed to prevent inappropriate use of networks. Given the topology below you are required to create access control lists to control the flow of data.

1.Write an ACL to block all web requests from 192.168.10.27
[6 Marks]

2.Write an ACL to block all FTP traffic from 192.160.11.65
[6 Marks]

3.Write an ACL to block all ICMP requests from entering the network.
[6 Marks]

Part 4: Substitution Cipher
Substitution ciphers are based on letter frequencies, length of words and frequency of occurrence. The graph below represents the occurrence in order of letters in the English language.
Consider the following quote from Frank Abagnale of Catch Me If You Can fame.
FC VLR EXMMBK QL QBII JB TEBOB VLSO TBOB YLOK VLRO AXQB LC YFOQE XKA QEXQ HFKA LC FKCLOJXQFLK QEBK FJ 98 MBOZBKQ LC QEB TXV QL PQBXIKD VLRO FABKQFQV

1.Complete the table below with the number of letter frequencies
2.Identify the most commonly occurring words. These will be two, three four letters long. [6 Marks]

3.De-crypt the message.[10 Marks]

站长地图