1. Suppose that as part of Bob’s early (unsuccessful) experiment with cloud based surveys, the authentication system allows the user to attempt 100 passwords per second, but the system locks when the authentication system has been open for 10 seconds, and the user must wait for a 5 second lockout period to resume attempting authentication. The password Bob used is 4 digits in length, only digits 0 - 9 allowed. 2. (a) Calculate the total amount of time required for the attacker to guarantee to guess the password, including delays and actual guessing time (b) Bob eventually adjusted his authentication system to make it more difficult using hashing and other techniques, but then he realized that Malice has been capturing the hashed passwords sent from his laptop to the cloud server for authentication, to try to replay the hashes. i. Explain which basic external attacks Bob’s authentication system is vulnerable to and ... ii. how you will improve the system.

Practical Management Science
6th Edition
ISBN:9781337406659
Author:WINSTON, Wayne L.
Publisher:WINSTON, Wayne L.
Chapter2: Introduction To Spreadsheet Modeling
Section: Chapter Questions
Problem 20P: Julie James is opening a lemonade stand. She believes the fixed cost per week of running the stand...
icon
Related questions
Question

1. Suppose that as part of Bob’s early (unsuccessful) experiment with cloud based surveys, the authentication system allows the user to attempt 100 passwords per second, but the system locks when the authentication system has been open for 10 seconds, and the user must wait for a 5 second lockout period to resume attempting authentication. The password Bob used is 4 digits in length, only digits 0 - 9 allowed.

2. (a) Calculate the total amount of time required for the attacker to guarantee to guess the password, including delays and actual guessing time (b) Bob eventually adjusted his authentication system to make it more difficult using hashing and other techniques, but then he realized that Malice has been capturing the hashed passwords sent from his laptop to the cloud server for authentication, to try to replay the hashes.

i. Explain which basic external attacks Bob’s authentication system is vulnerable to and ...

ii. how you will improve the system.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Process selection
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, operations-management and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Practical Management Science
Practical Management Science
Operations Management
ISBN:
9781337406659
Author:
WINSTON, Wayne L.
Publisher:
Cengage,
Operations Management
Operations Management
Operations Management
ISBN:
9781259667473
Author:
William J Stevenson
Publisher:
McGraw-Hill Education
Operations and Supply Chain Management (Mcgraw-hi…
Operations and Supply Chain Management (Mcgraw-hi…
Operations Management
ISBN:
9781259666100
Author:
F. Robert Jacobs, Richard B Chase
Publisher:
McGraw-Hill Education
Business in Action
Business in Action
Operations Management
ISBN:
9780135198100
Author:
BOVEE
Publisher:
PEARSON CO
Purchasing and Supply Chain Management
Purchasing and Supply Chain Management
Operations Management
ISBN:
9781285869681
Author:
Robert M. Monczka, Robert B. Handfield, Larry C. Giunipero, James L. Patterson
Publisher:
Cengage Learning
Production and Operations Analysis, Seventh Editi…
Production and Operations Analysis, Seventh Editi…
Operations Management
ISBN:
9781478623069
Author:
Steven Nahmias, Tava Lennon Olsen
Publisher:
Waveland Press, Inc.