Preview

IS4560 Hacking

Good Essays
Open Document
Open Document
675 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS4560 Hacking
Unit2 Assignment2
Vulnerability of a Cryptosystem

The vulnerability that has been discovered has a primary affect to a cryptosystem and a secondary affect to a cryptosystem. The vulnerability in question is a weakness in the MD5 algorithm that would allow for collisions in output. As a result, attackers can generate cryptographic tokens or other data that illegitimately appear to be authentic.
Now the secondary affect is that the MD5 hashes may allow for certificate spoofing on a Cisco ASA system.
If an attacker was able to exploit this weakness on the University's cryptosystem, the said attacker could construct forged data in a variety of forms that will cause software using the MD5 algorithm to incorrectly identify it as trustworthy. Since the underlying vulnerability occurs in a cryptographic primitive, specific exploitation scenarios vary widely depending on the nature of the data, the attacker has the ability to spoof and how it is validated by the software. For example, in a particularly egregious vulnerability scenario, a victim user may be mislead into supplying sensitive information to a malicious website believing that it is authentic based on an apparently valid signed SSL certificate.
There is currently not a fix or solution for the weakness/vulnerability. The best that has been presented are mere suggestions to implement. There are currently only (2) suggestions, those are, 1. Do not use MD5 algorithm, Software developers, Certification Authorities, website owners, and users should avoid using the MD5 algorithm in an capacity, it should be considered cryptographically broken and unsuitable for further use.
2. Scrutinize SSL certificates signed by certificates using MD5 algorithm. Users may wish to manually analyze the properties of web site certificates that are signed by signing certificates using the MD5 algorithm. The procedures for accessing certificate details differ depending on the software in use but the signature algorithm is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Unit 8 Lab 1

    • 421 Words
    • 2 Pages

    9. An open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110

    • 382 Words
    • 2 Pages

    Install a backup service that will provide onsite and off-site backup solution for all data on the servers.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I was able to review the duplicate KG’s and resolve them. There were several different issues that cause the duplication.…

    • 64 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Is3350 Project 2

    • 949 Words
    • 4 Pages

    No, because at some point you have to take ownership, even in the face of danger.…

    • 949 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Unit 2 Assignment 2

    • 676 Words
    • 3 Pages

    1. Microsoft is aware that research was published at a security conference proving a successful attack against X.509 digital certificates signed using the MD5 hashing algorithm. This attack method could allow an attacker to generate additional digital certificates with different content that have the same digital signature as an original certificate. The MD5 algorithm had previously shown a vulnerability, but a practical attack had not yet been demonstrated.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The project will be a multi-year phased approach to have all sites (except JV and SA) on the same hardware and software platforms.…

    • 991 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is3120 Ass 1

    • 330 Words
    • 2 Pages

    The Johnson Company will be able to reach out to its customers by basically creating a good “Web Page” where customers will be able to find all of their products and also pay online and order online. In addition orders will not be taken by hand anymore but online orders will be the main method used to order networking products.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    This is a lot like hardening the OS in respect that you are making sure that software stays up to date to ensure that known exploits are being addresses. Any unnecessary applications, services, or scripts that are installed should be removed immediately once the installation process is complete. Below are some things that you can do to harden software.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    It is a cryptanalytic attack that can be used against any encrypted data. It can be mitigated by choosing suitable passwords and putting in place lockouts that restrict access after x number of failed login attempts will significantly assist in reducing the risk of brute-force attacks.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Iscom 473

    • 507 Words
    • 3 Pages

    The Hula Hoop, Disneyland, The Mickey Mouse Club, Interstate Highways, Dishwashers, Hi-fis and Stereos, Poodle Skirts, McDonald’s, Drive-in Theaters, Levittown, Dr. Spock, Ozzie and Harriett, Leave it to Beaver, I Love Lucy, Father Knows Best, The Honeymooners, Amos ‘n Andy, My Little Margie, Echo Park, Persistent Poverty, Black Urban Migration, Urban Renewal, Massive Resistance, Beats; American Bandstand; Elvis Presley; James Dean…

    • 507 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3120 Unit 3

    • 650 Words
    • 2 Pages

    speeds of at least 100 megabits per second and actual upload speeds of at least 50…

    • 650 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    1. Why is it critical to perform a penetration test on a web application prior to production Implementation?…

    • 486 Words
    • 2 Pages
    Good Essays