cryptographic software
Case Study: Why Does Cryptographic Software Fail?
Read the case study titled, “Why Does Cryptographic Software Fail? A Case Study and Open Problems,” (original article located at http://people.csail.mit.edu/nickolai/papers/lazar-cryptobugs.pdf). Use the Internet to research the US Office of Personnel Management (OPM) and the 2015 data breach. Also, research the results that multiple organizations have experienced when they have implemented cryptographic software.
Write a three to four (3-4) page paper in which you:
- Examine two (2) major mistakes OPM made with cryptographic software. Recommend two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software
- Briefly describe OPM and its experience with cryptographic software. Analyze the company’s actions (or lack thereof) following the mistake and / or vulnerability
- Provide your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. If OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability, suggest one (1) action that it should take in order to correct the mistake and / or vulnerability. Provide a rationale for your response
- Examine the most common results that OPM have experienced when they implemented cryptographic software. Speculate two (2) reasons why organizations see such results. Provide a rationale for your response
- Use at least four (4) quality references in this assignment
Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
- Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA. Check with your professor for any additional instructions
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length
The specific course learning outcomes associated with this assignment are:
- Examine the challenges of computer security, including different threats and types of attacks
- Describe computational security and symmetric encryption techniques and adoption to modern organizations
- Use technology and information resources to research issues in cryptography
- Write clearly and concisely about cryptography using proper writing mechanics and technical style conventions
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
Points: 110 |
Case Study 3: Why Does Cryptographic Software Fail? |
|||
Criteria |
Unacceptable Below 70% F |
Fair 70-79% C |
Proficient 80-89% B |
Exemplary 90-100% A |
1. Examine two (2) major mistakes OPM made with cryptographic software. Recommend two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software. Weight: 20% |
Did not submit or incompletely examined two (2) major mistakes that OPM made with cryptographic software. Did not submit or incompletely recommended two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software. |
Partially examined two (2) major mistakes that OPM made with cryptographic software. Partially recommended two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software. |
Satisfactorily examined two (2) major mistakes that OPM made with cryptographic software. Satisfactorily recommended two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software. |
Thoroughly examined two (2) major mistakes that OPM made with cryptographic software. Thoroughly recommended two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software. |
2. Briefly describe OPM and its experience with cryptographic software. Analyze the company’s actions (or lack thereof) following the mistake and / or vulnerability. Weight: 20% |
Did not submit or incompletely briefly described OPM and its experience with cryptographic software. Did not submit or incompletely analyzed the company’s actions (or lack thereof) following the mistake and / or vulnerability. |
Partially briefly described OPM and its experience with cryptographic software. Partially analyzed the company’s actions (or lack thereof) following the mistake and / or vulnerability. |
Satisfactorily briefly described OPM and its experience with cryptographic software. Satisfactorily analyzed the company’s actions (or lack thereof) following the mistake and / or vulnerability. |
Thoroughly briefly described OPM and its experience with cryptographic software. Thoroughly analyzed the company’s actions (or lack thereof) following the mistake and / or vulnerability. |
3. Provide your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. If OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability, suggest one (1) action that it should take in order to correct the mistake and / or vulnerability. Provide a rationale for your response. Weight: 20% |
Did not submit or incompletely provided your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. Did not submit or incompletely suggested one (1) action that it should take in order to correct the mistake and / or vulnerability if OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability. Did not submit or incompletely provided a rationale for your response. |
Partially provided your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. Partially suggested one (1) action that it should take in order to correct the mistake and / or vulnerability if OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability. Partially provided a rationale for your response. |
Satisfactorily provided your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. Satisfactorily suggested one (1) action that it should take in order to correct the mistake and / or vulnerability if OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability. Satisfactorily provided a rationale for your response. |
Thoroughly provided your opinion on OPM’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. Thoroughly suggested one (1) action that it should take in order to correct the mistake and / or vulnerability if OPM has not corrected or does not have a plan to correct the mistake and / or vulnerability. Thoroughly provided a rationale for your response. |
4. Examine the most common results OPM has experienced when they implemented cryptographic software. Speculate two (2) reasons that organizations see such results. Provide a rationale for your response. Weight: 25% |
Did not submit or incompletely examined the most common results OPM has experienced when they implemented cryptographic software. Did not submit or incompletely speculated two (2) reasons that organizations see such results. Did not submit or incompletely provided a rationale for your response. |
Partially examined the most common results OPM has experienced when they implemented cryptographic software. Partially speculated two (2) reasons that organizations see such results. Partially provided a rationale for your response. |
Satisfactorily examined the most common results OPM has experienced when they implemented cryptographic software. Satisfactorily speculated two (2) reasons that organizations see such results. Satisfactorily provided a rationale for your response. |
Thoroughly examined the most common results OPM has experienced when they implemented cryptographic software. Thoroughly speculated two (2) reasons that organizations see such results. Thoroughly provided a rationale for your response. |
5. Provide three (3) references. Weight: 5% |
No references provided. |
Does not meet the required number of references; some or all references poor quality choices. Uses Internet references not published within the past [1] year. |
Meets number of required references; all references high quality choices. Uses Internet references published within the past [1] year. |
Exceeds number of required references; all references high quality choices. Uses Internet references published within the past [1] year. |
6. Clarity, writing mechanics, and formatting requirements. Weight: 10% |
More than 6 errors present. |
5-6 errors present. |
3-4 errors present. |
0-2 errors present. |