You are a system architect in a large cyber security consultancy. You have been asked to propose a solution to meet the requirements of a new client. The client is a UK University. The client uses an ID card-based authentication system to enable access to campus services such as those described in Section 2.2. The client is exploring the feasibility of replacing the card-based system with a phone app-based system.
You are required to produce: a Cryptool based cryptosystem simulation of a proposed campus identity management system (CIMS); an accompanying report; and a video which outlines and describes the CIMS.
The CIMS will comprise a combination of commercial off the shelf systems which will provide the functionality described in Section 2.2. Examples of these systems include, but are not limited to authentication/OTP systems including: Yoti, SecureAuth, Google Authenticator, Microsoft Authenticator; payment systems including: Apple Pay, Alipay, Blackboard Transact, WeChat Pay, Walmart Pay, Google Pay, Samsung Pay; physical access control systems including: FingerTec QR, AptiQmobile, HID Global, Tapkey, Stanley Onedoor, Onecard Mobile, Kisi and SSO/access gateway systems such as Okta verify
Design your CIMS using one or a combination of these and/or other products. For example, you might choose to use Google authenticator as the authentication system and Google Pay as the payment system. You might find a COTS that performs all the desired functions.
2.2 System Functionality
The CIMS must incorporate the following functionality. Users must be able to:
a. Borrow library books.
b. Submit and pay for document prints, and pay for other items on campus.
c. Access buildings/physical services using an underlying technology such as Bluetooth Smart , with a minimum security level of 1. Buildings/services include but are not limited to: the sports centre, accommodation, and campus buildings.
d. The University provides several web services including: VLE access, accommodation web site, email, file storage, library, and the sports centre. These services must be accessed through a single sign-in system.
e. Access to information systems must take place from a recognised host. When a user logs in from a different host, the system will generate a one-time passcode which the user must present within a defined time. When successfully presented, the system will implement the sign on process.
3.1 Cryptosystem (50%)
Simulate a provably functional cryptosystem using one Cryptool configuration for each of the requirements stated in Section 2.2. Each Cryptool configuration file must have an appropriate filename.
You are producing simulations. Your simulations may:
- Utilise the Achterbahn algorithm (or another algorithm) to demonstrate both symmetric and asymmetric encryption
- Pseudo implement an X.509 certificate.
- Make further assumptions which must be clearly stated.
Realistic implementations will attract more credit.
3.2 Report (40%)
Your report should contain:
a. Introduction. A very brief introduction outlining the scope of the report.
b. Technical Description.
a. Provide a brief description of each COTS used. How does the COTS work from a cryptosystem perspective?
b. By referring to the cryptosystem simulations, present a detailed technical description of the protocols and data exchanges between elements such as the user, browser, servers, databases.
Provide a critical overview of how these systems will work together in your design to achieve the desired system functionality described in Section 2.2.
c. Reflection. Provide a critique of the merits/demerits of the implementation. What are the assumptions made? Is there a more secure method of implementing any of the elements?
3.3 Video (10%)
A 10-minute video demonstrating the solution functionality. Your voice must be heard in this video and must evidence that you are the owner and narrator of this video. The video will walk through your cryptosystem simulation carefully explaining each element.
The main sources used in both chapters are Proverbs: A Handbook by Mieder W., American Proverbs about Women: A Reference Guide by Kerschen, L. and Realități sociale oglindite în proverbe by Zoltán, S., Cultural Dimensions in English and Romanian Proverbs by Lifari, V. and Vicol, D. Chapter One. The Concept of Proverb and Its Linguistic Aspects The reason of this chapter is to provide a presentation of the most important theoretical peculiarities associated with proverbs about women. It includes definitions of proverbs, their origins, paremiology, the image of women in English and Romanian cultures, and the linguistic features that refer to different types of category and classification according to diverse and various authors, and their general and well known characterization. The methods used here are analysis, synthesis, contrast, classification and comparison. 1.1. Definitions of Proverbs People speaks and communicate every day, every time they share and discuss pieces of information, they also have some conversation when they wants to express their thoughts, ideas and feelings but can not find the right words. In this instance the proverbs appear in their help. Proverb is a brief and a popular saying, or a phrase that gives advice and effectively embodies a commonplace truth based on practical experience or common sense. A proverb may have an allegorical message behind its odd appearance. The reason of popularity is due to its usage in spoken language as well as in the folk literature. Proverbs comes to mind automatically when speaking orally or writing on a paper, and their use depends on situation; they are practiced in political speech, in poetry, in familiar and friendly chats and in other cases extensively. A lot of scholars from antiquity and to our days have studied proverbs trying to define them and giving the best definition that would be accepted by everyone. There is a great need for wisdom in our society today. Lack of wisdom is destroying the lives of many young people, and making fools out of some who are older. Proverbs guide our thoughts and actions, and warn us of the hidden dangers along life’s way.>GET ANSWER