Security properties
In this exercise, let us assume that a hacker has found several vulnerabilities on the SecLab CTF server. By exploiting those vulnerabilities, that hacker is able to realize several attacks.
-
For each attack below, discuss the security property/ies as either “confidentiality”, “integrity”, “availability” that is/are at risk .
- read the solutions submitted by other users
- modify its own solution after the deadline
- read the handout of a challenge before its release data
- submit a solution to a challenge on behalf of another user
- delete someone’s else solution
- prevent users from submitting solutions
- shutdown the server
- steal all usernames and passwords
- use the server to mine bitcoins
- opens a backdoor on the server as root
-
Now, let’s do it the other way around! Come up with 3 possible attacks on SecLab, one for each security property and different than the ones given above.
Risk Assessment Analysis
-
Briefly explain the concept of risk exposure and explain how risk exposure are compared between each other (a.k.a triaging risk exposure)?
-
For each person below, do his/her risk assessment analysis by coming up with a sorted list of risks with probability and impact factor.
- a UofT student
- the founder of a startup
- a public figure
- a political leader