Construct the corresponding access control matrix

Assignment Help Computer Engineering
Reference no: EM133632157

Assignment

Problem I: Problem analysis

Next Generation 911 (commonly referred to as NG911) is a digital, internet protocol (IP)-  based system that will replace the analog 911 infrastructure that's been in place for decades. Check the following three YouTube videos for more information related to NG911.

1. "What is the next generation 9-1-1"

2. "Benefits of NG911 for Law Enforcement"

3. "Got 11 Min? Here's Why NG911 is more Cost Efficient than E911"

Consider you are a user or service provider (local emergency medical, first, or law enforcement agencies). Use your own words and give at least TWO examples given the confidentiality, integrity, and availability requirements associated with the system. Which one is a more important security requirement compared to the others?

1. Confidentiality

2. Integrity

3. Availability

4. Which one is more important, or which one is less important? Explain why.

5. If possible, list three research/open questions related to NG911 by doing some research.

Problem II: Classify each of the following as a violation of Confidentiality (C), Integrity (I), Availability (A), Assurance (AS), Authenticity (AU), or some combination of these.

1. Bob eavesdrops on Alice's text messages.

2. Bob crashes Alice's system.

3. Bob changes the amount of Alice's check from $100 to $1,000.

4. Bob forges Alice's signature on a deed.

5. Bob registers the domain name "Costco.com" and refuses to let the company buy or use that domain name.

6. Bob intercepts Alice's email message, changes the text, and forwards it to the intended recipient.

7. Bob is the software developer of the myleo system. Bob left a backdoor in the system so that he could access the system without 2-Step authentication.

8. Bob obtains Alice's credit card number and has the credit card company cancel the card and replace it with another card bearing a different account number.

9. Bob spoofs Alice's IP address to gain access to her computer.

10. Bob sends spam using his @tamuc.edu email address.

Problem III: Access Control

Assumption:

A. Privileges: read ("R"), write ("W"), execute ("X")

B. Resources:

1. Image files: tamuc.jpg, jessM.png, csci351.gif

2. Document files: syllabus.doc, lecture.ppt, assign01.odt - Binary files: a.exe, b.exe, c.exe, m.dmg

3. Video files: lecture01.mp4, lecture02.mp4

4. Web files: week1.html, week2.html, week3.php

C. Access permissions:

1. A has the privilege to read all the document files.

2. B has the privilege to read and write all the images files. - B and C have the privilege to read "syllabus.doc"

3. A and C have the privilege to read and execute "a.exe", "b.exe".

4. C and D have the privilege to read jessM.png.

5. D has the privilege to read and write all video files. - All users have the privilege to read all web files.

6. E has the privilege to read and write all web files.

Task

1. Construct the corresponding access control matrix. To answer, use the format in Table 1.1 in the textbook.

2. Construct the corresponding access control list. To answer, use the format in Figure 1.5 in the textbook.

3. Construct the corresponding capabilities list. To answer, use the format in Figure 1.6 in the textbook.

Reference no: EM133632157

Questions Cloud

How does the fictional video illustrate fear about communist : How does the fictional video illustrate the fears (actual or perceived) about communist teachers in the classroom?
Evaluate the neural network-predictive modelling capability : Evaluate the Neural Network-predictive modelling capability in the Orange Data Mining Application - implementing an image classification model
Which do you believe is the biggest reason reticent students : After reading the Wilen article, which do you believe is the biggest reason reticent students do not participate? Why do you think this is the case?
Performance and affected organizational goals : Evaluate how each one has contributed to Alphabet Inc.'s performance and affected its organizational goals.
Construct the corresponding access control matrix : CSCI 351- Construct the corresponding access control matrix. Construct the corresponding access control list. Construct the corresponding capabilities list.
Leadership styles report about Wal-Mart : Explain how this style integrates the organization's mission and vision. Explain how this style will increase value for stakeholders.
Determine the most critical merger or acquisition : Determine the most critical merger or acquisition that has contributed to Alphabet's performance and success in achieving organizational goals.
Creating realistic and controllable project budgets : Identify 7 key important steps or criteria for creating realistic and controllable project budgets.
In producer cooperatives workers own the company : In producer cooperatives, workers own the company and make all the key business decisions.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd