(20 points)
Attacks on a system can be categorized as insider or
outsider attacks. An insider attack is an attack by an entity inside
the security perimeter related to a company or organization (e.g.,
employee) that is authorized to access system resources but uses them in a way
not approved by those who granted the authorization. An insider
typically has an account or, at least, access to the system that is
attacked.
The other category is the outsider attack, which is a threat from someone
not directly related to the organization or company. An outsider could be
any person on the Internet. An outside attack is initiated from the
perimeter, by an unauthorized or illegitimate user of system.
Consider a commercial organization that conducts e-business e.g., sells
goods on-line. The components of such a system include a database of
goods, a database of transactions, sensitive customer information, as well
as internal organizational and employee information.
- (5 points)
Is this system vulnerable to insider attacks? If yes explain
why: describe sensitive resources and possible attacks by the insiders. If
no, explain your answer.
- (5 points)
Is this system vulnerable to outsider attacks? If yes explain
why: describe sensitive resources and possible attacks by the outsiders. If
no, explain your answer.
- (5 points)
What security components are important to protect the system?
- (5 points)
Suggest explicit security policies supported by the security
components you identified in your answer to 6c that protect the system
against the attacks you identified in your answer to 6a and 6b.