watch a video and answer 5 questions, computer science homework help

Anonymous
timer Asked: Apr 7th, 2017
account_balance_wallet $10

Question Description

Please find the attached then watch a video and will find 5 questions in file.

Unformatted Attachment Preview

Management Information Systems 14e KENNETH C. LAUDON AND JANE P. LAUDON CHAPTER 8 CASE 3 SUMMARY SECURING INFORMATION SYSTEMS IBM Zone Trusted Information Channel (ZTIC) More and more attacks on online banking applications target the user’s home PC, changing what is displayed to the user while logging and altering key strokes. In order to foil these threats, the IBM Zurich Research Lab has developed the Zone Trusted Information Channel (ZTIC), a hardware device that can counter these attacks in an easy-to-use way. L=3:07. Systems URL CASE http://www.youtube.com/watch?v=mPZrkeHMDJ8 Online banking is growing in popularity due to its convenience and ease of use. However, as with any transactions that take place over the Internet, online banking transactions are vulnerable to multiple types of malicious attacks. Although phishing is still a common method that hackers use to commit bank fraud, another method that is difficult to combat is a “man-in-the-middle” attack, referred to in the video as a “man-in-the-browser”’ attack. Banking transactions are traditionally conducted via two-factor authentication (T-FA). An authentication factor is a piece of information or process used to verify the identity of a person (or other entity) requesting access to a restricted asset or area. Authentication factors are classified into three groups: human factors (biometrics, for example, “something you are”), personal factors (“something you know”), and technical factors (“something you have”). Two-factor authentication is a system in which two different factors are used in conjunction to authenticate. An example of a traditional two-factor authentication method is the use of a bank card and a PIN number to access a bank account from an ATM. continued CHAPTER 8, CASE 3 IBM ZONE TRUSTED INFORMATION CHANNEL (ZTIC) 2 However, if a transaction is initiated on a computer with malware installed, the security of the transaction is compromised. Not even “padlocked” areas of the Internet that would otherwise be secure can protect against this. IBM’s Zone Trusted Information Channel (ZTIC, pronounced similarly to “stick”) protects against this. The device sets up a secure link between the ZTIC and the bank’s server. Because there’s a direct connection between the user and the back-end banking server, and because this session is protected by keys that reside on the device itself (and not on the user’s hard drive, where malware can find it), the ZTIC guarantees that banking transactions are secure. Additionally, the user must press “OK” on their ZTIC to legitimate any banking transaction. So if a user suddenly sees that their ZTIC is asking them to authorize a very large payment to an unknown account, he or she can cancel the transaction before it takes place. According to IBM, “Various alternatives exist for protecting users against state-of-the-art attacks to online authentication, such as chip card technology or special browser software. The core difference between the ZTIC and these alternatives is that the ZTIC does not rely whatsoever on any software running on the PC, such as device drivers or user interface elements, as these can in principle be subverted, e.g., painted over, by attackers’ malware.” Hackers and malware are continually developing new tools to commit identity theft and fraud, so it’s important that new advances like the ZTIC become available to stay one step ahead. VIDEO CASE QUESTIONS 1. What are some common types of malicious software, or malware? What best describes the “man-in-the-middle” type of attack? 2. Provide some examples of each type of authentication factor. What are your personal experiences with each? 3. Can you think of any drawbacks of the ZTIC device? 4. How might malicious attackers try to get around devices like the ZTIC? 5. Do you foresee a future where malware is completely eliminated, or protections are so good that malware is no longer a threat? Explain your answer. continued CHAPTER 8, CASE 3 IBM ZONE TRUSTED INFORMATION CHANNEL (ZTIC) 3 COPYRIGHT NOTICE Copyright © 2014 Kenneth Laudon. This work is protected by United States copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Dissemination or sale of any part of this work (including on the World Wide Web) will destroy the integrity of the work and is not permitted. The work and materials from this site should not be made available to students except by instructors using the accompanying text in their classes. All recipients of this work are expected to abide by these restrictions and to honor the intended pedagogical purposes and the needs of other instructors who rely on these materials. ...
Purchase answer to see full attachment

Tutor Answer

Drval
School: Boston College

Attached.

1

Question 1:
Malicious software or malware is a software that is made with the intention of compromising
computer systems or gain control and steal data. There are several types of malware and some
are:
Virus
This is a software that is able to copy itself to different programs and spread to other computers.
It can compromise files, computers and networks etc.
Ransomware
This is a type of software that can hold a computer system captive and then demand a ransom,
the user of the computer ...

flag Report DMCA
Review

Anonymous
Excellent job

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors