Answershould be original, and similarity (plagiarism)not more than 10% this is very important otherwise I will be in trouble. Answer should be a clear explanation and shouldbe clear understanding...

1 answer below »


Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.



Answer should be a clear explanation and should be clear understanding (1000 words).



Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books.



When use citation from any reference please keep it between "citation" (Author,Year),please citation should be not more than 5%



As reference you can use the following book:


Security Engineering: A Guide to Building Dependable Distributed Systems (2nd Edition)


Author: Anderson, R.


ISBN: ISBN-10: 0470068523 ISBN-13: 978-0470068526


Publisher: John Wiley & Sons



Book available from below link:



http://www.cl.cam.ac.uk/~rja14/book.html


Chapter 2 (pp 17-60), chapter 4 (pp 93-104), chapter 6 (pp 192-211).


Skim sections 4.2.3-4.2.7, 4.3, 6.2, 6.4.2. Total - 73 pages



Assignment is:



1) An increasingly common mechanism is to ask for several pieces of security information rather than one. A call center might ask not just for your mother’s maiden name, a password, and the amount of your last purchase, but also your dog’s nickname and your favorite color. Such schemes need careful evaluation of their usability and effectiveness using the tools of applied psychology. Design such a password protocol and evaluate its usability and effectiveness. (A verbal text description is enough.) (500 words)
2) Analyze one of the commonly used password management protocol (e.g., Microsoft Outlook password management), what is the weakness of this protocol? (300 words)
3) Design an algorithm to achieve the Byzantine Agreement for the case that there are four processes, amongst which one is corrupted. You should not use public key cryptography for your algorithm (200 words)


Answered Same DayDec 22, 2021

Answer To: Answershould be original, and similarity (plagiarism)not more than 10% this is very important...

Robert answered on Dec 22 2021
125 Votes
Ques.: An increasingly common mechanism is to ask for several pieces of security
information rather than one. A call center might ask not just for your mother’s maiden
name, a password, and the amount of your last purchase, but also
your dog’s nickname
and your favourite color. Such schemes need careful evaluation of their usability and
effectiveness using the tools of applied psychology. Design such a password protocol and
evaluate its usability and effectiveness.
Designing a password protocol involves posing for many items of security data instead of
one via a novel psychological theme. Metallic element at Stanford references that,
"Password authentication protocols are available several flavours, however all of them solve
an equivalent problem: One party should somehow convince another party that it is aware
of some password P, sometimes set earlier.
To design such protocols, your queries would vary from the trivial to the unbelievably
complex; and will provide some sort of protection from numerous attacks mounted by
malicious or to a fault curious third parties.
All types of the questions fall under three main categories:
 User own physical authentication (Retina scanning, fingerprint etc.)
 User identification cards
 User Password or pins
Designing a verifier-based protocol is significantly tougher than coming up with a traditional
shared-secret authentication protocol, as a result of the booster and password area unit by
definition not equivalent (thought he previous is also derived from the latter), forcing the
process structure of the protocol to be inherently uneven.
The next step is to implement a password policy. The reference book references that, "A
password policy could be a set of rules designed to boost laptop security by encouraging
users to use sturdy password and should be used properly. The policy is usually a part of an
organization's official laws and will be instructed as part of security awareness coaching. It
should either be informatory or mandated by technical means that. The typical components
of a password policy include:
Password length
Many policies require a minimum password length, typically 6 or 8 characters. Some system
imposes the restriction for maximum length for the support for legacy systems.
Password formation
Some of...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here