• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.701 ■ Spring 2021 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook

My question to discuss with my classmates

February 3, 2021 by Jose Gomez 50 Comments

Filed Under: 04 - Cryptography Tagged With:

Reader Interactions

Comments

  1. Zibai Yang says

    February 4, 2021 at 10:02 am

    What could cause SSL or TLS certificate error?

    Log in to Reply
    • Vanessa Marin says

      February 8, 2021 at 9:19 pm

      SSL cert errors happen when a browser isn’t able to verify that the SSL certificate has been installed on a website. This will flag the site as insecure and will require you to manually override and proceed to the site or navigate away from the page.

      There are several kinds of SSL errors:
      – SSL cert is not trusted
      – Name mismatch
      -Mixed content
      -Expired SSL

      You can fix theses errors by using an online tool like SSL Checker to verify which SSL cert your are missing. Once you have that info, you can install an intermediate cert to establish the connection, generate a new “Certificate Signing Request” or CSR, upgrade to a dedicated IP address for your site, get a wildcard SSL cert, change all the URLs to HTTPS by editing the source code of the page and finally you could also renew the certificate if it is expired.

      You can find websites that provide step-by-step tutorials on any of the fixes listed above.

      Log in to Reply
      • Vanessa Marin says

        February 8, 2021 at 9:38 pm

        https://blog.hubspot.com/website/fix-ssl-certificate-error#:~:text=An%20SSL%20certificate%20error%20occurs,the%20browser%20you're%20using.

        Log in to Reply
  2. Wenyao Ma says

    February 5, 2021 at 9:55 am

    Can encrypted information still be compromised?

    Log in to Reply
    • Haozhe Lin says

      February 6, 2021 at 3:05 am

      Encryption does not protect your data. It protects access to your data. Enough time and computing resources can be used to hack or decrypt the encrypted data, to reveal the original content. Hackers prefer to steal encryption keys or intercept data before or after encryption. The most common way to crack encrypted data is to use the attacker’s key to add an encryption layer. All encrypted data can be hacked. As we develop more powerful computers and higher-order mathematical operations, the spotlight becomes stronger on the weakest link (people using encryption technology). It is necessary to understand, develop and make good use of information security practice in addition to worry about if the encrypted data can be hacked.

      Log in to Reply
    • Anthony Messina says

      February 9, 2021 at 5:02 am

      Encryption, like all other forms of security are not 100%. Cracking encryption is all about computing power. The stronger the computational power, the better chances you have at cracking an encryption cipher. This is way there is a lot of talk about quantum computing these days and its ability to crack our current encryption standards. The jury is still out on this, but if history is any indication, infosec as a whole will need to develop stronger encryption standards as the processing power of computers grows.

      Log in to Reply
    • Prince Patel says

      February 9, 2021 at 11:04 pm

      Hi Wenyao,
      I agree with Anthony that encryption is all about computing power. Current day encryption works because the current computing power is weak to crack the current encryption standards in short amount of time. It is only a matter of time the computing power grows exponentially and will require upgrades in encryption ciphers for it to work with the growing computing power.

      Log in to Reply
  3. Haozhe Lin says

    February 6, 2021 at 3:06 am

    How many will be considered as strong symmetric keys? What do you think is a strong symmetric key?

    Log in to Reply
    • Zibai Yang says

      February 7, 2021 at 1:48 pm

      Hi Haozhe,

      The symmetric encryption algorithm only transfers the possibility of leakage from the cipher text to the encryption algorithm and the secret key. For example, if you use a secret key that is as long as the original string to perform XOR encryption every time you encrypt, it is absolutely safe in theory.

      Log in to Reply
  4. Anthony Wong says

    February 6, 2021 at 8:46 am

    How do the strengths of symmetric and asymmetric complement each other in transferring data?

    Log in to Reply
    • Anthony Wong says

      February 6, 2021 at 8:46 am

      symmetric and asymmetric keys*

      Log in to Reply
    • Zibai Yang says

      February 7, 2021 at 1:51 pm

      Hi Anthony,

      Symmetric key encryption, also known as private key encryption, means that the sender and receiver of information use encrypt and decrypt data. Its biggest advantage is fast encryption/decryption speed, suitable for encrypting large amounts of data, but key management is difficult.

      Asymmetric key encryption, also known as public-key encryption, requires using a pair of keys to complete the encryption and decryption operations. One is publicly released, that is, the public key, and the other is kept secret by the user, the private key. The message sender uses the public key to encrypt, and the message receiver uses the private key to decrypt. The public key mechanism is flexible, but the encryption and decryption speed is much slower than symmetric key encryption.

      Log in to Reply
      • Anthony Wong says

        February 8, 2021 at 5:15 am

        Hi Zibai,

        Great answer! I would like to add an encrypted symmetric key can be encrypted again with with the sender’s public key or receiver’s public key to further enhance security.

        Log in to Reply
  5. Jonathan Castelli says

    February 6, 2021 at 12:16 pm

    With the advancement of quantum computers, the encryption used for communicating will be cracked easier and users can read everything in plaintext if they have access to this type of computing power. Do you feel cryptography will be useless? If yes, does that mean the end of confidentiality and privacy when communicating online?

    Log in to Reply
    • Junhan Hao says

      February 9, 2021 at 5:06 am

      Hi Jonathan,
      I agree with you that Quantum computers are one of the potential threats to cryptography. Although quantum computers can currently only solve certain types of problems, this situation will not last forever. Quantum computers can effectively break the current popular public key algorithms. This sounds terrible.
      I think when people designing the blockchain and the underlying encryption algorithm, should consider how to make it have anti-quantum properties, which is very important.

      Log in to Reply
  6. Kyuande Johnson says

    February 6, 2021 at 8:51 pm

    What are the pros and cons of using Symmetric Encryption? and is it more secure than Asymmetric Encryption?

    Log in to Reply
    • Heather Ergler says

      February 7, 2021 at 4:54 pm

      Symmetric encryption is simple, less costly and usually requires less processing time and RAM. Asymmetric keys are more expensive, complex and require more processing time to encrypt. Symmetric keys do have some problems though if the key is compromised or in the initial communications between parties when the key needs to be exchanged. Ultimately, most organizations use both symmetric and asymmetric keys for the cryptographic lifecycle.

      Log in to Reply
    • Priyanka Ranu says

      February 9, 2021 at 8:06 pm

      Symmetric encryption is simple, less complex, faster, and best-known encryption technique. It uses one key for both encryption and decryption. Disadvantage of symmetric encryption is that it causes more damage if compromised. What this means is If someone gets access to symmetric key, they can decrypt and encrypt everything with the key. Asymmetric encryption is more secure as it uses different keys for encryption and decryption. The disadvantage is that it takes more time than symmetric encryption.

      Log in to Reply
  7. Krish Damany says

    February 6, 2021 at 10:38 pm

    What’s a main difference between ciphers and codes?

    Log in to Reply
    • Zibai Yang says

      February 7, 2021 at 1:58 pm

      Hi Krish,

      In my own understanding, both code and cipher refer to passwords, but they encrypt information in different ways. The code uses other words or letters to replace the original words, while the ciphers use symbols to replace individual letters, and the order of the letters can also be changed.

      Log in to Reply
    • Anthony Messina says

      February 9, 2021 at 5:14 am

      How I understand it, a cipher in a traditional sense is a system to make a word or message secret by changing or rearranging the letters in the message. An example of a cipher would be the “rotation 13” algorithm (ROT13) where letters are assigned the letter 13 spots after it in the alphabet. This results in A=N, B=O, etc. A code is a way of changing entire words or phrases into something else. Codes generally require a reference or a code book to interpret the message which is why the use of codes as fallen out of general use.

      Log in to Reply
  8. Ting-Yen Huang says

    February 6, 2021 at 11:21 pm

    For encryption, the longer the key the harder it can be decrypted by brutal force. Are there other kinds of encryption method that could have shorter key length but hard to break though?

    Log in to Reply
  9. Ting-Yen Huang says

    February 7, 2021 at 1:39 am

    Former US cyber chief calls for military to attack hackers. The former US government cyber security chief ahs called for the military to target organized criminal gangs of hackers who launch ransomware attacks on companies and governments. He suggested military cyber attackers could try to deter gangs using ransomware by publishing their private details, a tactic known as doxing. Ransomware attacks have become increasingly prevalent in recent years as criminals have taken advantage of the widespread use of cryptocurrencies such as bitcoin to collect payment without being tracked. The shift to remote working during the pandemic has left businesses more vulnerable to attacks. The practice has become more common in part due to the development of the “ransomware-as-a-service” market, where sophisticated hackers rent out their expertise to criminals without the requisite coding skills needed to launch an attack.
    https://www.ft.com/content/27c09769-ceb5-46dd-824f-40b684d681ae

    Log in to Reply
  10. Xinyi Zheng says

    February 7, 2021 at 2:35 am

    What is the main difference between symmetric encryption and asymmetric?

    Log in to Reply
    • Mei X Wang says

      February 7, 2021 at 7:59 pm

      The main difference between symmetric encryption and asymmetric encryption are the keys used. In symmetric, they will be the same key used to encrypt and decrypt a file. In asymmetric encryption, one key is used to encrypt the data, the receiver has a different key used to decrypt the data(public and private keys).

      Log in to Reply
    • Anthony Messina says

      February 9, 2021 at 5:20 am

      The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption. This is also a faster form of encryption. The asymmetric encryption uses public key for encryption and a private key for decryption and takes more time to complete the process on both ends.

      Log in to Reply
    • Junhan Hao says

      February 10, 2021 at 3:55 am

      In the symmetric encryption algorithm, encryption and decryption use the same key, that is, the same key is used to encrypt and decrypt the same password.
      Asymmetric encryption has two keys, a public key and a private key . The public key and the private key exist in pairs. If the original text is encrypted with the public key, only the corresponding private key can be used to decrypt it.

      Log in to Reply
  11. Humbert Amiani says

    February 7, 2021 at 3:11 am

    Can one way hashing systems be reverse-engineered?

    Log in to Reply
    • Priyanka Ranu says

      February 9, 2021 at 7:40 pm

      A one-way hash is a function that takes a variable length string and produces a fixed length value called a hash value. One-way hash function cannot be reversed as it is designed that way and can function in only one direction. One way hash function is one of the best methods to ensure the integrity of the data.

      Log in to Reply
  12. Anthony Messina says

    February 7, 2021 at 3:35 am

    What are the three key lengths offered by AES?

    Log in to Reply
    • Vanessa Marin says

      February 8, 2021 at 9:44 pm

      Each has a block size of 128 bits but have three different key lengths: 128, 192 and 256 bits.

      The key “size” in the cipher specifies the number of transformation rounds that convert the input aka plaintext into the ciphertext. Respectively, 10 rounds, 12 rounds and 14 rounds for each bit key.

      Log in to Reply
      • Vanessa Marin says

        February 8, 2021 at 9:44 pm

        https://en.wikipedia.org/wiki/Advanced_Encryption_Standard#:~:text=For%20AES%2C%20NIST%20selected%20three,which%20was%20published%20in%201977.

        Log in to Reply
    • Xinyi Zheng says

      February 9, 2021 at 7:08 pm

      AES is a symmetric type of encryption, it have three lengths and each key length has a different number of possible key combinations:
      128-bit key length: 3.4 x 1038
      192-bit key length: 6.2 x 1057
      256-bit key length: 1.1 x 1077

      Log in to Reply
    • Prince Patel says

      February 9, 2021 at 11:09 pm

      Hi Anthony,
      Each key has the block has a block length of 128 bits.
      the three different key lengths are 128, 192, 256. the key lengths are determined based on trade off between speed/accessibility and security. The more secure the key the lower the accessibility.

      Log in to Reply
  13. Priyanka Ranu says

    February 7, 2021 at 1:38 pm

    The book mentioned about human issues in cryptography, and I highlighted this in my post as well. Why are users the weakest link and threat to data security and how can this be prevented?

    Log in to Reply
    • Mei X Wang says

      February 7, 2021 at 7:58 pm

      Users are considered the weakest link and the biggest threat to data security because human users are more inclined to manual errors. We are not robots trained by algorithms so we are unable to identify patterns as quickly, we might not realize a suspicious email is phishing because we are accepting only stagnant forms of threats we know. This can be prevented by additional training and monitoring for users to get familiar with identifying phishing and build behavior to lessen the risks.

      Log in to Reply
  14. Cami Chen says

    February 7, 2021 at 3:02 pm

    How do we use symmetric encryption in our daily activities for confidentiality?

    Log in to Reply
    • Xinyi Zheng says

      February 9, 2021 at 6:57 pm

      Symmetric encryption was used in some common area in our daily life, such as payment applications and card transactions where PII needs to be protected to prevent identity theft or fraudulent charges, validations to confirm that the sender of a message is who he claims to be, or random number generation or hashing.

      Log in to Reply
  15. Heather Ergler says

    February 7, 2021 at 4:55 pm

    Why are VPNs so popular? Are they better than SSL/TPS or IPsec?

    Log in to Reply
    • Xinyi Zheng says

      February 9, 2021 at 7:01 pm

      VPN encryption prevents third parties to read data as it passes through the internet. Both IPsec and SSL/TLS VPNs can provide enterprise-level secure remote access, but they do so in fundamentally different ways. IPsec VPNs protect IP packets exchanged between remote networks or hosts and an IPsec gateway located at the edge of your private network. SSL/TLS VPN products protect application traffic streams from remote users to an SSL/TLS gateway.

      Log in to Reply
  16. Austin Mecca says

    February 7, 2021 at 6:02 pm

    What would be a real world example of humans using “authentication” with each other?

    Log in to Reply
  17. Mei X Wang says

    February 7, 2021 at 7:55 pm

    What areas of cryptography are you familiar with? What do you think is the best form of cryptography?

    Log in to Reply
  18. Junhan Hao says

    February 7, 2021 at 9:27 pm

    What is a weakness of a code? How is this avoided?

    Log in to Reply
  19. Zhen Li says

    February 7, 2021 at 10:24 pm

    What’s the best form and combination of encryption? What are the specific criteria?

    Log in to Reply
    • Junhan Hao says

      February 9, 2021 at 4:38 am

      AES provides the most secure algorithm. In the symmetric encryption algorithm, the encryption and decryption keys are the same. The key is negotiated between the receiver and the sender, but it cannot be directly transmitted on the network, otherwise the key will be leaked. Usually the key is encrypted by an asymmetric encryption algorithm, and then transmitted to the other party through the network, or directly discussed face-to-face Key.

      Log in to Reply
  20. Vanessa Marin says

    February 7, 2021 at 11:42 pm

    What do you guys know about quantum key encryption?

    Log in to Reply
    • Cami Chen says

      February 9, 2021 at 12:43 pm

      Hi, Vanessa. I just read about how quantum computing can identify vulnerabilities in commonly used encryption, even the advanced encryption standards. In my opinion, I think quantum key encryption can help us to avoid these kinds of vulnerabilities and make it more complicated for the attack to break the encryption since it combines classical cipher and some properties of quantum mechanics.

      Log in to Reply
  21. Prince Patel says

    February 7, 2021 at 11:50 pm

    what is a VPN? what are the different kinds of VPN?

    Log in to Reply
    • Vanessa Marin says

      February 8, 2021 at 9:37 pm

      Probably the most popular tool on the internet right now! 🙂

      VPN = Virtual Private Network
      It’s a way to provide the user with online privacy and anonymity by allowing you to create a private network across a public internet connection. Your IP is masked when you use a VPN making your activity untraceable. You can hide your browsing history, your IP address and location, your streaming locations, your devices, and your web activity.

      When selecting a VPN you should look out for a few things:
      – Privacy – do they have a no-log policy?
      – Protocols – are they running the most current protocol?
      – Bandwidth – do they limit your data?
      – Server – where are they located?
      – Devices – can you set up a VPN on multiple devices or different types?
      – Cost – free vs paid AND what is included in each

      VPN paid:
      Norton Secure VPN – $4.99/mo, $7.99/mo, $9.99/mo
      PureVPN – $10.95/mo
      PVanish – $11.99/mo
      CyberGhost – $12.99/mo
      Hotspot Shield – $12.99/mo
      VyprVPN – $12.95/mo
      Private Internet Access – $9.95/mo
      StrongVPN – $10/mo
      Surfshark – $12.95/mo
      NordVPN – $11.95/mo
      ExpressVPN – $12.95/mo
      TorGuard – $9.99/mo
      Encrypt.me – $12.99/mo
      Safer VPN – $12.95/mo
      HMA – $59.88/year (only annual plans available)
      Tunnel Bear – $9.99/mo

      VPN free:
      Hotspot Shield – a free version is available with 500 MB/day data limit
      Tunnel Bear – free version with up to 500MB of secure browsing

      Log in to Reply
      • Vanessa Marin says

        February 8, 2021 at 9:38 pm

        https://us.norton.com/internetsecurity-privacy-what-is-a-vpn.html

        Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in