1.
Cryptolocker is a malware released in September 2013, Cryptolocker spread through
email attachments and encrypted the user's files so that they couldn't access them. The
hackers then sent a decryption key in return for a sum of money, usually somewhere from a
few hundred pounds up to a couple of grand (Norton.com, 2017).
a.
Which information security property is breached when a user is not able to
access files that they are authorised to view and modify?
[1]
b.
Explain why the legitimate users are not able view or access their files. [2]
c.
If the hacker gives the users, the correct decryption key will the users be able to
access their files?
[1]
d.
If your answer in 'le' is yes explain how the users will be able to access their
files. If your answer is no explain why the users will not be able to access their files.
e.
Given that the users are able to accessthe encrypted files. Why would the users
still not be able to understand what is contained in their files?
[2]
f.
Suppose the users had already encrypted their files before the hackers
encrypted them. Would the users have been able to access their files after they had
been encrypted by the hackers? Explain your answer.
[3]
g.
Which security property/objective would the users have achieved against the
hackers given the description in (lf).
[1]
2.
Public key encryption algorithms are used to distribute public keys and private
(session) keys for symmetric encryption algorithms.
a.
Explain how a public key is distributed using public key encryption
algorithms.
[3]
b.
Explain how a session key is distributed using public key encryption
algorithms.
[3]
Page 215