Assignment 7

docx

School

Kennesaw State University *

*We aren’t endorsed by this school

Course

4833

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by MagistrateScience5019

Report
Asg7 – CPS and Wireless Security Total points: 100 Part 1: CPS Security [45 points] Read the article titled “Cyber-Physical Systems: A Security Perspective” (a copy is in d2l module). Then answer the following questions. Define each of the following, provide an example and describe challenges and Security Countermeasures for each – 15 points each. (i) Smart Grid Definition: is an electricity network based on digital technology that is used to supply electricity to consumers via two-way digital communication Example: U.S. smart grid Challenges: integrated control devices are running OS with published bugs and vulnerabilities like buffer overflows, making them vulnerable to attacks. Devices lack authentication support, allowing unauthorized users to gain access and operate system settings and operations. Malware might be installed on devices prior the shipment to the target location or devices might be infiltrated inside the trusted perimeter, deliberately or not, by personnel. Countermeasures: Implementation of remote access VPN and Network Intrusion Prevention System (IPS) and Network Intrusion Detection System (IDS) technologies. (ii) Smart Home Definition: a convenient home setup where appliances and devices can be automatically controlled remotely from anywhere with an internet connection using a mobile or other networked device Example: Amazon Echo, Google Home Challenges: An attacker breaches, interrupts, or spoofs communications between two systems. Countermeasures: Device Identification and Access Control, Authentication, Encryption. (iii) Health Care System. Definition: is the organization of people, institutions, and resources that deliver health care services to meet the health needs of target populations. Example: Wearable and implantable medical devices Challenges: Vulnerable to network attacks and may be compromised at a device level. Computers that aren’t in restricted areas can easily be accessed by unauthorized users. If these open computers are connected to sensitive patient information, unauthorized staff or others in the area could have access to sensitive information. Countermeasures: Fault recovery mechanism, better attack detection to take preventive actions, physically unclonable function use for authentication. Feel free to use additional references but you need to cite any additional sources. Part 2: Wireless Security [55 points]
Read the article titled “A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends” (a copy is in d2l module). Then answer the following questions. (i) List and define the security requirements in wireless networks . (15 points) Maintaining confidentiality: limiting data access to intended uses, while making sure to prevent unauthorized users from getting access to sensitive information. Authenticity: this refers to differentiating authorized users from unauthorized users. Integrity: Specified to guarantee the accuracy of the trans- mitted information without any falsification Availability: Specified to make sure that the authorized users can access wireless network resources anytime and anywhere upon request (ii) List and describe the attacks at the PHY and MAC layers. (20 points) PHY layers: Eavesdropping: refers to the interception of confidential information Jamming: refers to the interruption of legitimate transmission. MAC layers: MAC spoofing: Falsification of MAC address Identity theft: Stealing of a legitimate user's MAC identity MITM attack: Impersonation of a pair of communicating nodes Network injection: refers to the injection of forged network commands and packets (iii) Provide an example of a PHY attack (10 points) Traffic analysis: an attacker can judge the base station position according to the changes of network traffic in wireless sensor networks. The attacker interferes with or captures the base station, which leads to paralysis of the entire wireless sensor networks. (iv) Provide an example of a MAC attack (10 points) An attacker changes the MAC address of their station to enter a target network as an authorized user taking over a computer's identity that is authorized to function on the network . For examples of (ii) you may need additional references. You need to cite any additional sources if used.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help