You are on page 1of 2

. For the equity trading system discussed in Section 13.4.

2, whose architecture is shown

in Figure 13.14, suggest two further plausible attacks on the system and propose

possible strategies that could counter these attacks.

Attack 1: A maliciouse user gain access to the system using an accredited user credentials.

Malicious orders are placed, and stock is bought and sold.

Strategy to counter the attack:

Resistance: In order to place an order a dealing password is required which is different

from login password.

Recognition:

 Send a copy of order by email to authorized user with contact phone number.

 Maintain user’s order history and check for unusual trading patterns.

Recovery:

 Provide mechanism to automatically undo trades and restore user accounts.

 Refund users for losses that are due to malicious trading.

 Insure against consequential losses.

Attack 2: An unauthorized user corrupts the transaction database by gaining permission to

issue SQL commands directly. Reconciliation of sales and purchase is therefore

impossible.

Strategy to counter the attack:

Resistance: Using a stronger authentication mechanism, such as digital certificates for the

authorization of privileged users.

Recognition:

 Maintain read-only copies of transactions for an office on an international server.

Periodically compare transactions to check corruption.


 Maintain cryptographic checksum with all transaction records to detect corruption.

Recovery:

 Recover database from backup copies.

 Provide a mechanism to replay trades from a specified time to recreate the

transactions database.

You might also like