Can capabilities protect against all trojan horses

Assignment Help Software Engineering
Reference no: EM13311665

1. A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, the en add more code, then test, and continue this iteration. Every day they test the code base as a whole. The programmers work in pairs when writing code to ensure that at least two people review the code. How would you explain to this company how their software is in fact not high assurance" software?

2. Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

A) In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists

B) Consider now the inheritance of properties of new processes. If the creator controls which capabilities the created process is given initially, how could the creator limit a damage that a Trojan Horse will do?

C) Can capabilities protect against all Trojan Horses? Either show that they can or describe a Trojan horse process that can C-Lists cannot protect against.

 

 


Attachment:- Computer-Security-Art--and--Science-Questions--for-transtutors.docx

Reference no: EM13311665

Questions Cloud

Led is blinking a different color than usual : 1. Joe has just moved his PC to his new offce. After hooking up all the cables, he turns on the system, and when it asks for his password, the keyboard will not respond. What could possibly be wrong?
What is the force constant of this spring : An unstretched spring is 13.0 cm long. When you hang an 845 g weight from it, it stretches to a length of 16.0 cm. What is the force constant (in N/m) of this spring
Choose an information system for an individual project : Choose an information system for an individual project.
Find the acceleration of this skier : A skier approaches the base of an icy, frictionless hill with a speed of 13.4m/s . The hill slopes upward at 24.0^\circ above the horizontal. Find the acceleration of this skier
Can capabilities protect against all trojan horses : A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, the en add more code, then test, and continue this iteration.
What is the acceleration due to gravity on the asteroid : If the period of a 10-m long pendulum is 18 s on an asteroid, then what is the acceleration due to gravity on the asteroid
Find the potential energy stored in the spring : A 0.50 kg mass is attached to a spring of spring constant 20 N/m along a horizontal, frictionless surface. Find the potential energy stored in the spring when the mass is at its maximum displacement
Explain the steps required to file a civil lawsuit : Explain the steps required to file a civil lawsuit against a supplier to supply parts that work
Construct relational database for new yorks fire department : The state wants to record fire department for which each fire fighter currently works and each fire fighter's supervisor. Supervisors are always higher-ranking certified fire fighters - Construct relational database for New York's fire departments..

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd