Exercises on introduction
Question 0
Consider the phenomenon of identity stealing in social networks (e.g., Facebook, Twitter), which happens when a cyber criminal steals the username and password of a user and uses them to impersonate that user (e.g., post content, send messages to friends, etc., without the user's consent).
Solution
In the risk scenarios described in the previous answer, one asset is the victim's reputation, another asset is the victim's friends computers.
Solution
No user additional verification
Solution
The threats are that the victim's identity could be used to negatively affect the reputation of the user.
Another one is that the stolen account is used to post malicious content (e.g., links to malicious sites), which is spread among the victim's friends.
Further one is the fact that since the user may be using the same password for multiple websites, the attacker may have access to other servises
Solution
The threat agent is a cyber criminal motivated either by hatred against the victim, or by the possibility of abusing the victim’s credibility to spread malicious content.
Question 1
Consider the following scenario: A small manufacturing company, one of the most important producers of a specialized musical instrument, is hit by a ransomware attack (i.e., infected by malware with the sole purpose to encrypt all the files in the infected computer until the victim pays a ransom to the attacker). The ransomware is able to quickly propagate to all the computers in use by the company.
Solution
Threat/Risk 1
Threat/Risk 2
Solution
The most likely threat agent is a cybercriminal motivated by the fact that the victim will pay a ransom, due to the value of the assets at risk. Another possible threat agent is a competitor who wants to damage the company’s ability to carry on business or to cause monetary loss. If the victim is listed on the stock market a threat agent could be a malicious trader willing to capitalize on stock loss.
Question 2
Consider a self-driving and Internet-connected vehicle (e.g., self-driving car), such as the ones currently being developed, being used in a taxi service scenario:
Solution
Solution
Solution
Question 3
An Internet-connected “smart speaker”, featuring a voice-controlled intelligent virtual assistant (think about a device similar to Amazon Echo, Google Home, or Jarvis), is installed inside a house.
The speaker is connected to a wireless network, and linked to a cloud service account (e.g., the owner’s Google/Amazon/iCloud/... account). The device is always listening for a particular keyword (e.g., “OK, Google!”). As soon as the keyword is detected, it records a short audio clip, which is uploaded to a cloud speech recognition service. Then, the device performs the action requested in the recognized command.
The available actions allow to search particular pieces of information on the Internet (e.g., providing weather or traffic information), or to interact with the owner’s cloud account (e.g., making and accessing to-do lists stored in the cloud, playing music from a streaming service). Furthermore, the device can act as a “home automation hub” controlling “smart” devices via voice commands. Thus, the device supports commands to turn on and off the house lights, open the front door, control the heating, and so on.
Solution
Solution
Solution
Question 4
“SmartCar” is a new device that you can plug into your car to keep track of your driving habits and patterns—as well as your car’s location—directly from your smartphone.
All modern automobiles are equipped with an internal wired network that connects together all the electronic control units (e.g., engine controller, dashboard, parking sensors). This network is used to exchange commands and data, including safety-related ones (e.g., data for the ABS, setpoint of the cruise control). This network is based on the standard known as CAN (controller area network): all messages are broadcast to all control units connected to the network, are not encrypted, and their sender is not authenticated. In order to gather information about how the vehicle is driven, “SmartCar” must be physically connected to the car’s internal CAN network, where it actively exchanges messages with the car’s control units in order to gather the required data.
Furthermore, to display real-time data, “SmartCar” is connected via Bluetooth to the vehicle owner’s smartphone, and sends information about the vehicle’s location to a remote server over a cellular network (3G\4G), so that the vehicle’s owner can constantly track its movements—for instance to remotely locate the vehicle in case of theft. Consider the following scenario: a vehicle owner installs “SmartCar” in their car.