Cybersecurity Architecture: Cloud Access & Parcel Security - USQ 2019

Verified

Added on  2022/09/12

|8
|1999
|14
Report
AI Summary
This report provides an overview of cybersecurity architecture, focusing on cloud system access and parcel box security. It discusses authentication methods, password reset procedures, and recommendations for strong password maintenance. The report also covers access control and security rules for parcel box systems, including the use of tickets, tokens, and cookies for user authentication. Furthermore, it explores alternative one-time pad algorithms for message encryption and decryption. The conclusion emphasizes the importance of access control and unique login identities for enhancing security and preventing unauthorized access. Desklib provides students access to similar solved assignments.
Document Page
CYBERSECURITY ARCHITECTURE
STUDENT NAME:
STUDENT ID:
COURSE NAME:
i
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
TABLE OF CONTENTS
Page
TITLE................................................................................................................…………... ……..i
TABLE OF CONTENTS .............................................................................................………….ii
ABSTRACT …….......................................................................................................................... iii
INTRODUCTION ........................................................................................................................ iv
CHAPTER
1. Cloud System Access
1.1. Authentication……………………………………………………………………...…..1
1.2. Rules for a password reset service….……….…………………………………….…...1
1.3. A Strong Password should;…………………………………...……………….…..….. 1
1.4 Password Reset…………………………………………………………..…..….……..1
1.5 Recommendations for Strong Password maintenance………….…….………………..1
2. Parcel Box System……………………………………………………………………..2
2.1 Access Control…………………………………………………………….…….….2
2.2 Security Rules………………………………………………………………………..2
2. Proof that users can reset their password…………………………………………...2
2. An alternative one-time pad algorithm……………………………………………...2
2. How large are p and q?……………………………………………………………....2
CONCLUSION……………………………………………………………………………....3
REFERENCES……………………………………………………………………………....4
ii
Document Page
ABSTRACT
Cloud system access gives an upper hand on how management can be centralized, observed and
even controlled using modern technology without any cost and complexity. The latest technology
comes with a full package of cloud wiring, verification service, real-time updates, revoke rights,
centralized management among other services.
iii
Document Page
INTRODUCTION
Authentication is a scenario whereby the client interacts with the system with aim of confirmation
using the data available in the database so that it can provide service if the client is authorized hence
they can log in but if not they can't log in. This service will ensure that only authorized people can
access services hence the information is secured and only confidential. To enhance security, all
authenticated users should be provided with a unique login identity. This will ensure that no
multiple logins are using a single identity hence the parcel delivers will only access. The rules and
regulations should clearly state the judges of the individual found breaching it will be prosecuted in
a court of law.
iv
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
3.2 Cloud System Access
Cloud system access gives an upper hand on how management can be centralized, observed and
even controlled using modern technology without any cost and complexity. The latest technology
comes with a full package of cloud wiring, verification service, real-time updates, revoke rights,
centralized management among other services Kavallieratos (2020, March pp. 202-217).
Authentication
Authentication is a scenario whereby the client interacts with the system with aim of confirmation
using the data available in the database so that it can provide service if the client is authorized hence
they can log in but if not they can't log in. This service will ensure that only authorized people can
access services hence the information is secured and only confidential Duenn and Schaefer (2020
pp. 305-313).
Rules for a password reset service
A strong password is something that is reasonable and cannot be easily guessed by anybody or some
software designed to scan and guess Langer (2020 pp. 181-199).
A Strong Password should;
1. It should at least have 8 minimum characters in length
2. Have upper and lowercase alphabetic characters (e.g. A-Z, a-z)
3. Have at least one numerical character (e.g. 0-9)
4. Have at least one special character (e.g. ~!@#$%^&*()_-+=)
Password Reset
Password reset is necessary in-case you forget it or you suspect that the login details are
compromised hence you must reset the password. Below are some procedures Islam and
Aktheruzzaman (2020 pp.11-25);
1. Click on “Forgot Password” on the login screen
2. Enter your valid username then click on the “Reset via email” button
3. You will receive an email with a link for resetting the password
4. Click on that link then change your password by entering a completely new password
Recommendations for Strong Password maintenance:
1. Never share your password in any case to anyone for any reason even your close friends because
they might gain access and manipulate some credentials for their use.
2. Make sure that you keep your logins secured because this way will make your credentials
confidential.
3. Try using a passphrase to such as lyrics in your favorite song or anything you can quickly
remember which is very long hence making your password very strong.
4. Be careful to always keep away your password because it might fall in the wrong people.
5. Never reuse the same password especially to your multiple accounts because in-case malicious
person identify then it will be a horrible situation to all your accounts
1
Document Page
Exercise 3.6 Parcel Box System
Access Control
Access control is a scenario where the restrictions are applied to certain users. For instance, the
parcel box owner has only allowed a specific number of deliveries who do the delivery services and
the owner has the record of their total number. Now in the case then several login persons reach the
exact number then the next person to log in will not be authenticated. This situation is possible
because the restrictions have been made on the number of people they are allowed to access the
parcel box at a time and in case the threshold is exceeded then the extra person cannot be allowed to
login and access the parcel box Chadwick et al. (2020, pp.710-722).
Security Rules
Parcel box authentications must contain features such as ticket/token/cookie for a user to be able to
log in and access the services. Force attempts will always result in failed login because you have to
provide correct credentials such as username and password which match what is in database
systems. Fail to do so then the user will only be on login screen hence can't access the services
enjoyed by authenticated users Jehle and Möller (2020 pp. 325-334).
To enhance security, all authenticated users should be provided with a unique login identity. This
will ensure that no multiple logins are using a single identity hence the parcel delivers will only
access. The rules and regulations should clearly state the judges of the individual found breaching it
will be prosecuted in a court of law Chadwick et al. (2020, pp.710-722).
Exercise 3.7: Proof that users can reset their passwords
Password reset can be achieved by click the forgot password on the login page. To reset the
password, the user, the user must provide a valid email address matching the username. The
Password link will be sent to the email which is valid for 30 minutes only. In case the user delays
then the link will be invalid. The user through that link is allowed to set new password direct and
after resetting the password then the link will be revoked hence it cannot be used anymore Javed et
al. (2020 pp.47-56).
Exercise 4.2: An alternative one-time pad algorithm
One-time pad algorithm is a process of decrypting the encoded message using the only key. The
decryption of the encoded message requires some one-time pad to allow the process to be
completed. This one-time pad scenario is secured even though random symbols might be a problem.
The process is very secured since before sending the message, it is encrypted by encoding it and the
one-time pad is generated so that the message receiver will use that one-time pad to decrypt the
message Langer (2020 pp. 181-199).
Exercise 4.4: How large are p and q?
The most important thing is that it becomes more difficult to find out p or q from n only when a
large amount of p and q are accurately and sufficiently chosen. It is possible to use encryption
algorithm when we already have an idea of n and e but so longest we know n and d then we can
encrypt pseud-code. Therefore, applying the RSA scheme of the pair integers of n and e will
contribute to the private key while n and d will contribute to the public key. RSA applies in integers
of 0 to n where n is the product of the two prime numbers Guo et al. (2020).
2
Document Page
CONCLUSION
Access control is a scenario where the restrictions are applied to certain users. For instance, the
parcel box owner has only allowed a specific number of deliveries who do the delivery services and
the owner has the record of their total number. Now in the case then several login persons reach the
exact number then the next person to log in will not be authenticated. This situation is possible
because the restrictions have been made on the number of people they are allowed to access the
parcel box at a time and in case the threshold is exceeded then the extra person cannot be allowed to
login and access the parcel box. To enhance security, all authenticated users should be provided
with a unique login identity. This will ensure that no multiple logins are using a single identity
hence the parcel delivers will only access. The rules and regulations should clearly state the judges
of the individual found breaching it will be prosecuted in a court of law.
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCE
Langer, A.M., (2020). Cyber Security in Analysis and Design. In Analysis and Design of Next-
Generation Software Architectures (pp. 181-199). Springer, Cham.
Chadwick, D.W., Fan, W., Constantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., Manea, M.,
Mori, P., Sajjad, A. and Wang, X.S., (2020). A cloud-edge based data security architecture for
sharing and analyzing cyber threat information. Future Generation Computer Systems, 102,
pp.710-722.
Javed, Y., Felemban, M., Shawly, T., Kobes, J. and Ghafoor, A., (2020). A Partition-Driven
Integrated Security Architecture for Cyberphysical Systems. Computer, 53(3), pp.47-56.
Duenn, H.W. and Schaefer, L.W., (2020). Integral Corporate Cyber Security—Challenges and
Chances for Showing the Way Towards Effective Cyber Governance. In Redesigning Organizations
(pp. 305-313). Springer, Cham.
Guo, Y., Lou, X., Bajramovic, E. and Waedt, K., (2020). Cybersecurity risk analysis and technical
defense architecture: Research of ICS in nuclear power plant construction stage. In Proceedings of
the 3rd IAEA International Conference on Nuclear Security: Sustaining and Strengthening Efforts
(ICONS 2020)(to appear).
Jehle, I.A. and Möller, D.P., (2020). Vehicular Cybersecurity Through Intrusion Detection and
Prevention Architecture. In Smart Technologies (pp. 325-334). Springer, Singapore.
Islam, M.R. and Aktheruzzaman, K.M., (2020). An Analysis of Cybersecurity Attacks against
Internet of Things and Security Solutions. Journal of Computer and Communications, 8(4), pp.11-
25.
Kavallieratos, G., Katsikas, S. and Gkioulos, V., (2020, March). Modelling Shipping 4.0: A
Reference Architecture for the Cyber-Enabled Ship. In Asian Conference on Intelligent Information
and Database Systems (pp. 202-217). Springer, Cham.
4
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]