• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

My question to discuss with my classmates

January 30, 2020 by Wade Mackey 24 Comments

Filed Under: 04 - Cryptography Tagged With:

Reader Interactions

Comments

  1. Numneung Koedkietpong says

    February 1, 2020 at 9:34 am

    Is it possible that hackers can compromise data or system via encryption key? How?

    Log in to Reply
    • Christopher James Lukens says

      February 3, 2020 at 10:32 pm

      A possible answer to this question is if you were using a weak encryption standard. If you were to use something like DES which is quite old there is a good chance a hacker would be able to figure out the encryption. Des was many years ago and doesn’t stand up to modern computing power. this is why its important to keep up with encryption standards to keep your data confidential.

      Log in to Reply
  2. Zeynep Sahin says

    February 1, 2020 at 12:55 pm

    Which security standard does NIST SP 800-53 define for guidance on managing information security risk at three distinct tiers?

    Log in to Reply
  3. Akshay Shendarkar says

    February 1, 2020 at 7:51 pm

    With the rapid rise in VoIP, what cryptographic solutions can be designed to protect the unprotected voice calls which will be routed on unprotected public networks?

    Log in to Reply
    • Numneung Koedkietpong says

      February 3, 2020 at 10:31 am

      Hi Akshay, Good question and interesting. I did not have no idea about this and want to know the answer also. So, I researched about this topic and found some information. There are two ways for VoIP encryption
      – SIP Signalling Encryption using Transport Layer Security (TLS)
      – SRTP (Secure Real-Time Transport Protocol)
      These two ways of encryption can enhance integrity and authentication aspects.
      Source: https://www.taraspan.com/blog/voip-encryption/

      Log in to Reply
  4. Iyana Lester says

    February 2, 2020 at 10:37 am

    Boyle and Panko mention that the key must be kept secret. However, do you believe the cipher should also be kept secret?

    Log in to Reply
    • Junjie Han says

      April 1, 2020 at 12:04 pm

      Yes, I think the decryption method is highly confidential data. When the decryption method is cracked, the security of the encrypted information cannot be guaranteed.

      Log in to Reply
    • Peiran Liu says

      April 1, 2020 at 2:01 pm

      Cipher doesn’t need to be kept secret, as if the method is mature enough, even if the attacker has the cipher, the decryption without a key will still take a long enough time to make the secret protected.

      Log in to Reply
  5. Christopher James Lukens says

    February 2, 2020 at 2:29 pm

    How do you decide the bit length of encryption keys for systems?

    Log in to Reply
    • Zeynep Sahin says

      February 3, 2020 at 11:55 pm

      Hi Christopher,
      Key length must be large enough that a brute-force attack is impossible. Today, computational power determines whether breaking an encrypted text is possible or not for an attacker. So, the level of achievement of security changes over years as computational power increases. Hence, if a key length becomes vulnerable over years, key size is increased.

      Log in to Reply
  6. Natalie Dorely says

    February 2, 2020 at 6:58 pm

    Is it possible for a hacker to use malware in order to break through an encryption key?

    Log in to Reply
    • Numneung Koedkietpong says

      February 3, 2020 at 10:42 am

      Hi Natalie, I researched about your question and yes, it is possible for attackers to use malware through encryption key in order to break into the system. It’s known as the threat : Encrypted Malware in SSL. Hackers implement fake SSL certification via phishing websites. In this way, if victims click the link, hackers can an embed their malware into the encrypted traffic and try to bypass any firewall system.
      Here are some sources that I found related to this topic;
      https://www.eurodns.com/blog/encrypted-malware-evades-ssl-detection
      https://www.thesslstore.com/blog/a-sneaky-online-security-threat-encrypted-malware-in-ssl/
      https://www.pandasecurity.com/mediacenter/malware/encrypted-malware-facilitated-gdpr/

      Log in to Reply
  7. Innocent says

    February 2, 2020 at 10:19 pm

    Which reliable method can an organization use to exchange the secret keys or send information outside its network without compromising with its security or authenticity?

    Log in to Reply
    • Zeynep Sahin says

      February 3, 2020 at 11:12 pm

      Hi Innocent,
      Key exchange is a method in cryptography allowing key exchange between two parties. Key exchanging method depends on the encryption technique that is used. For example, If the cipher is a symmetric key cipher, both sender and receiver will need a copy of the same key. On the other hand, if asymmetric encryption or public-key cryptography is used, a message encrypted using a private key can be decrypted using a public key.

      Log in to Reply
  8. Sarah Puffen says

    February 2, 2020 at 11:58 pm

    In the UK, the Regulation of Investigatory Powers Act (RIPA) can send you to prison for refusing to surrender your encryption keys. What type of encryption technique can be used so that the owner is seemingly unable to decrypt the data?

    Log in to Reply
    • Zeynep Sahin says

      February 3, 2020 at 11:41 pm

      Hi Sarah,
      If confidentiality of the data sent is the most important, “Secure Message format” can be used. The sender encrypts the file with the receiver’s public key. It provides confidentiality of the file because encrypted file can only be decrypted by the person who has the corresponding private key. Symmetric key algorithms provide confidentiality but not authenticity or nonrepudiation. If the authenticity is the concern, in this case, asymmetric cryptography might be used.

      Log in to Reply
  9. Junjie Han says

    February 3, 2020 at 1:01 am

    What are the main causes of encrypted information being compromised in the world today?

    Log in to Reply
    • Numneung Koedkietpong says

      February 3, 2020 at 10:52 am

      Hi Junjie, Good question. I think there are many ways which hackers can compromise encrypted information and it can affect to confidentiality and integrity. I think the main important cause comes from lacking of policy and procedures about encryption management to secure data. Without establishing proper policy and procedure, there is no guideline to follow and it still leaves many vulnerabilities. In addition, I additionally found a interesting topic about Cryptographic Vulnerability from OWASP. See more details here >> https://wiki.owasp.org/index.php/Category:Cryptographic_Vulnerability.

      Log in to Reply
  10. Joseph Nguyen says

    February 3, 2020 at 10:19 am

    Open SSL can be used to create a public and private key. There should be a means to use it easily and conveniently enough to be adopted by everyone.

    Log in to Reply
  11. Imran Jordan Kharabsheh says

    February 3, 2020 at 12:05 pm

    Which approach to improving controls do you prefer, as an auditor? The Gap Analysis approach or the Requirements Definition approach?

    Log in to Reply
    • Sarah Puffen says

      February 4, 2020 at 11:12 am

      I would say it depends on the situation and resources – gap analysis seems like it would be best for a system that has a number of common controls, while requirements definition might be better when there aren’t as many common controls.

      Log in to Reply
  12. Alexander Reichart-Anderson says

    February 4, 2020 at 11:25 am

    How can we leverage the cryptographic methods to secure the data, people, and systems within Temple or any organization we work for? (Aside from the simple password)

    Log in to Reply
  13. Peiran Liu says

    April 1, 2020 at 1:57 pm

    How to balance cost and effectiveness when choosing the encryption method between all kinds of methods based on their performance requirements and encryption level?

    Log in to Reply
  14. Percy Jacob Rwandarugali says

    April 18, 2020 at 11:04 pm

    When would you most consider encryption, in transit or at rest?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in