In this task you will create a Certification Authority (CA) which will act as a subordinate Enterprise Certification Authority to issue certificates to users and computers for an organisation called Hexad0m. An offline root Certification Authority is expected to be installed and configured to establish the fundamentals in the PKI architecture to serve as an issuer to your subordinate CA. You will also demonstrate a comprehensive threat model against two categories, namely identity spoofing and CA threats as part of your analysis. The group is advised to use a Windows 2012 server and any machine to perform the attacks against the system. Groups are free to completely virtualise the testing environment.
Your work must be presented in the form of a Project Report and be no longer than 4500 words (excl. references, figures, tables and appendices) plus a facing page that includes the executive summary. This should be typed on A4 paper and use a font size Arial 10 single spacing. For completeness, you may if you wish include additional material in an appendix but this will not contribute to the marks.
The technical requirements are listed as follows:
1.Install and configure an offline Root Certification Authority
2.Install and issue a Certification Authority
3.Configure the appropriate certificate templates of the issuing CA
4.Check the revocation status of certificates by installing and configuring an online responder
5.Create a fully operational TLS-enabled Web page and observe encrypted traffic
6.Demonstrate at least two (2) attacks against your PKI infrastructure in alignment with the two (2) threat categories outlined in Section 2.
The non-technical Requirements are listed as follows:
1.SSL PKI threat model: Identify the threats, attacks arising from the proposed description of the SSL PKI security issues raised in your design/proposal. Create and discuss a taxonomy of those threats relevant to your design and propose suitable mitigation plans with clear references to the literature. You are required to threat model only against identity spoofing and certificate authority threats using a standardised methodology to identify and rank the threats identified.
2.Threat Ranking: Define, adopt and validate the appropriate method to rank threats in SSL PKI architecture.
3.Threat mitigation Plan: A detailed threat mitigation plan is also required as part of your deliverables. Clear evidence of a systematic approach taken to validate threats identified must be clearly articulated as part of your analysis.
PKI Risks: Critically discuss at least two (2) significant risks of PKI and link these to privacy. What kind of ethical and legal concerns are raised by the adaptation of PKI in Industry 4.0 for the authentication of IoT devices?
Assessment criteria
Executive Summary (5 marks )
Introduction (5 Marks)
SSL PKI Design & Implementation (45Marks)
Install and configure an offline Root Certification Authority
Install and issue a Certification Authority
Configure the appropriate certificate templates of the issuing CA
Check the revocation status of certificates by installing and configuring an online responder
Create a fully operational TLS-enabled Web page and observe encrypted traffic
Demonstrate at least two (2) attacks against your infrastructure in alignment with the threat modeling approach
SSL PKI Threat Modeling & Ethical Considerations (35 Marks)
SSL PKI Threat modelling approach (threat identification, 35 Page 3 of 5 LD7007 Network Security – Assignment Brief validation) PKI security issues/attacks relevant to the case with discussion
Threat mitigation plan(s)
Critical discussion on ethical and legal issues
Conclusion (5 Marks)
References (5 Marks)
Marks deducted in case of poorly structured reports, layout, word count (15 marks) Total 100
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more