Can capabilities protect against all trojan horses

Assignment Help Software Engineering
Reference no: EM13311665

1. A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, the en add more code, then test, and continue this iteration. Every day they test the code base as a whole. The programmers work in pairs when writing code to ensure that at least two people review the code. How would you explain to this company how their software is in fact not high assurance" software?

2. Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

A) In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists

B) Consider now the inheritance of properties of new processes. If the creator controls which capabilities the created process is given initially, how could the creator limit a damage that a Trojan Horse will do?

C) Can capabilities protect against all Trojan Horses? Either show that they can or describe a Trojan horse process that can C-Lists cannot protect against.

 

 


Attachment:- Computer-Security-Art--and--Science-Questions--for-transtutors.docx

Reference no: EM13311665

Questions Cloud

Led is blinking a different color than usual : 1. Joe has just moved his PC to his new offce. After hooking up all the cables, he turns on the system, and when it asks for his password, the keyboard will not respond. What could possibly be wrong?
What is the force constant of this spring : An unstretched spring is 13.0 cm long. When you hang an 845 g weight from it, it stretches to a length of 16.0 cm. What is the force constant (in N/m) of this spring
Choose an information system for an individual project : Choose an information system for an individual project.
Find the acceleration of this skier : A skier approaches the base of an icy, frictionless hill with a speed of 13.4m/s . The hill slopes upward at 24.0^\circ above the horizontal. Find the acceleration of this skier
Can capabilities protect against all trojan horses : A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, the en add more code, then test, and continue this iteration.
What is the acceleration due to gravity on the asteroid : If the period of a 10-m long pendulum is 18 s on an asteroid, then what is the acceleration due to gravity on the asteroid
Find the potential energy stored in the spring : A 0.50 kg mass is attached to a spring of spring constant 20 N/m along a horizontal, frictionless surface. Find the potential energy stored in the spring when the mass is at its maximum displacement
Explain the steps required to file a civil lawsuit : Explain the steps required to file a civil lawsuit against a supplier to supply parts that work
Construct relational database for new yorks fire department : The state wants to record fire department for which each fire fighter currently works and each fire fighter's supervisor. Supervisors are always higher-ranking certified fire fighters - Construct relational database for New York's fire departments..

Reviews

Write a Review

Software Engineering Questions & Answers

  Investigate and analyse the effect of applying cmmi practice

ITECH3501- 6501 Principles of Software Engineering:  Investigate and analyse the effect of applying CMMI practices/processes in an Agile environment in terms of business performance improvement and the limitations/restrictions of using both, and writ..

  Draw entity-relationship diagram students playing games

Draw an entity-relationship diagram for the following situation: Many students play many different sports. One person, called the head coach, assumes the role of coaching all these sports.

  Grassroots computing changes way software is designed

Describe how grassroots computing changes the way software is designed, developed, tested, and maintained in typical organization. Write dwon the advantages and disadvantages of grassroots computing?

  Provide a rationale as to why add information

Promotion time is coming around the corner!In last board meeting, your supervisor has asked someone to create a list of tables for a Fernandos Skate Shop consumer orders.

  Describe what actions you would take and in what sequence

Consider a situation in which your team has just finished the design phase and is about to start coding. Your key applications designer just walked in and handed you a resignation notice.

  Context level dfd to level 0 dfd to illustrate sub-systems

Explode Context level DFD to Level 0 DFD to illustrate sub-systems (processes). Level 0 DFD illustrates internal data stores and how data flows through processes.

  Design entity relationship diagram for catered accommodation

Design an entity relationship diagram for the case, explaining any suppositions you deem essential for atered or non-catered accommodation at the centre.

  Program to attack the textbook rsa encryption scheme

Write a program to attack the Textbook RSA Encryption Scheme in order to decrypt the encrypted file key_enc.txt which contains the 128 bits AES secret key together with the initialisation vector

  Sketch entity-relationship diagram of database table

Convert table to 3NF. Represent your answer in DBDL. Give table name and fields. Underline primary key. Sketch entity-relationship diagram showing all relationships.

  Data flow diagram for student assistant of local law firm

Design a data flow diagram to include all functions and data flows as described in this situation, starting from time you submit your time sheet.

  Fixing errors for java code

The code compiles properly and runs, but result is not what you expected; output is similar to the following, Describe what the problem is how to fix it.

  Erp project implementation

Based upon the preliminary information developed by CCC (Toledo Pizza Company - ERP Implementation (A)) and further analysis using benchmarking information, the following information became available:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd