Assignment - build your own system

Assignment Help Computer Networking
Reference no: EM132969611

Assignment Part I : Windows Security
An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that:
• no exploitable vulnerabilities of any kind exist;
• the attacker has a non-privileged account on the system;
• basic system access controls do not currently permit the attacker to access the file and the attacker cannot directly change these controls; and
• the attacker cannot physically tamper with the system in any way.

Outline and describe the core security mechanisms that the Windows OS implements to prevent the attacker from achieving that goal. Please include a brief discussion of the low- level mechanisms that protect the operating system from an attack who targets the layer below. The marks breakdown table below may assist you in identifying the general issues that need to be covered.
In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer. You may find that the information discussed in lectures and contained in the textbook substantially assist you to frame your answer. However, you may wish to do some additional research.
You should include a complete reference list of any additional sources that you have used.

Assignment Part II - Build Your Own System
You are welcome to pair with another student (ideally from the same tutorial session) to complete this assignment.
This assignment has two phases: (1) topic proposal and (2) final report.
Assume that you are given a task to design an information system (e.g., a transport system, a cloud-based storage system, etc.). Briefly discuss security requirements for such a system. Outline a security architecture that could achieve the specified security goals in your system. You must include in your discussion of the security limitations of your approach.
Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist as a specific product or system, so you are expected to think creatively about this solution. It is likely that you will need to undertake some research to assist in answering this part of the problem.

Proper APA style

Attachment:- Assignment.rar

Reference no: EM132969611

Questions Cloud

What would be the balance on the deferred income non-current : Elphick plc, What would be the balance on the deferred income non-current liability account in respect of the grant as at 31 March 20X9?
Provide journal entries to account for the revaluation : Sam Ltd purchases a depreciable machinery on 1 July 2020 for $100 000. Provide journal entries to account for the revaluation
What amount will appear under cash flows : What amount will appear under cash flows from financing activities in the statement of cash flows of for the year ended 30 September 20X2
Compute its monthly operating income : If? Mables's Engine Company purchases? 1,000 Z92 parts from the outside supplier per? month, then compute its monthly operating income
Assignment - build your own system : In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer
What is the correct accounting treatment for the provision : What is the correct accounting treatment for the provision and retraining / relocation costs in the financial statements for the year ended 30 September 2020
Prepare journal entries to accrue salaries on June : The company deducts 25% for income tax and 8% for superannuation. Prepare journal entries to accrue salaries on 30 June
What is the earning per share and the profit margin : Blue Bird Inc., What is the Earning per Share and the Profit Margin for 2021 if Blue Bird has 1,500 outstanding common shares in 2021
Estimate the breakeven ebitda margin for the project : Estimate the breakeven EBITDA margin for the project, for the investment to have a zero NPV, if you now assume that the project lasts forever

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss the advantages and disadvantages of star and bus

Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document.

  Explain networking and data communication technologies

HS1011 Data Communication and Networks Assignment, Holmes Institute, Australia. Explain networking and data communication technologies

  Do some online research on mans and metro ethernet

Do Some online research on MANs and Metro Ethernet. Write a short paper comparing Metro Ethernet to other MAN alternatives.

  Hps cloud computing services compare with azure

Based on the Barr (2010) article, how does IBM's Cloud Computing Services compare with those provided by Azure? Based on the Barr (2010) article, how does HP's Cloud Computing Services compare with those provided by Azure

  Depict topology in the diagram

Depict topology in the diagram, Determine if this is a peer-to-peer or client-server network. Be sure to explain what assumption drove you to select it.

  Explain how signal and signal management calls

Describe how signal and signal management calls are used in creating a process and terminating it after certain interval. Give a simple example to illustrate this routine.

  What kind of security issues require to be considered when

q1. what are some of the reasons an organization might consider using a wireless lan?q2. what type of security issues

  Discuss the characteristics of vlans

VLANs are a common element in business communications and mobile connectivity. Identify and discuss the characteristics of VLANs and why they are important to.

  Identify strategies to control and monitor event

Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure

  What are the key components of an erp system

What are the key components of an ERP system? If you are a large business how would you go about getting one, installing it and implementing

  Many lan administrators require frequent password changes

1.write a 200- to 300-word response to the following question what are the predominant electronic and physical threats

  What types of networks have you used

What types of networks have you used? How does a network topology affect data communication?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd