Implementation of Cyber Security Defenses
I'm working on a cyber security multi-part question and need an explanation to help me learn.
After the financial institution deployed defenses to stop her last attack, Anna cannot do it again in the same way, but she realizes that the system still may have vulnerabilities that can be exploited. She studies the company carefully and finds out that some of the managers still use old phones that encrypt their communications with WEP. She also finds out that the customer files are stored in relational databases using SQL as query language and that can be queried from the internet. She also sees that the company lets its employees and customers write financial hints in their web site. Finally, she discovers that the managers, trying to save money, decided not to encrypt the files, relying only in RBAC for their protection. They also never implemented two-factor Authentication.
Q1. Find two possible attacks that would still let Anna get the customer files. Describe them in words only (no diagrams). Use the block or UML class diagram of the system as guideline (see Solutions).
Q2. Draw the sequence diagram for one of these attacks. Use the diagrams of Assignment 2 as references to define objects.
Q3. Show how to stop the specific attack that you showed in Q2. Use the same style as in Q3 of Assignment 2, list the defenses and correlate them to events in Q2.