Describe the core security mechanisms

Assignment Help Other Subject
Reference no: EM132578140

ICT379 Security Architectures - Murdoch University

Part I
An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access.

You may assume that:
• no exploitable vulnerabilities of any kind exist;
• the attacker has a non-privileged account on the system;
• basic system access controls do not currently permit the attacker to access the file and the attacker cannot directly change these controls; and
• the attacker cannot physically tamper with the system in any way.

Outline and describe the core security mechanisms that Windows implements to prevent the attacker achieving that goal. Include a brief discussion of the low-level mechanisms that protect the operating system from an attack that targets the layer below. The marks breakdown table below may assist you in identifying the general issues that need to be covered.

In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer. You may find that the information discussed in lectures and contained in the textbook substantially assist you to frame your answer. However, you may wish to do some additional research.

Part II
Assume that you are given a task to design a system for a vehicular network (or any cloud-based storage system). Briefly discuss security requirements for such a system. Outline a security architecture that could achieve the specified security goals in the scenario. You must include in your discussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist as a specific product or system, so you are expected to think creatively about this solution. It is likely that you will need to undertake some research to assist in answering this part of the problem.

Expectations

• Students are expected to demonstrate a significant level of engagement with the topic as appropriate for someone in the final year of a degree. Superficial answers or irrelevant material will not be awarded any marks.

• This assignment is deliberately designed to require you to think about what
information to include and how best to present it.

• The page limit is intended to make you stop and think about every word that you put in and how it can earn you marks: use each word wisely. Assignments that simplyfill the page limit with vague or irrelevant statements or unnecessary tables of contents etc. will almost certainly fail.

• Employers of IT graduates consistently rate communication skills as the most
important attribute they look for when hiring. Your ability to explain technical concepts clearly and concisely is central to your employability and career prospects.

Attachment:- Security Architectures.rar

Reference no: EM132578140

Questions Cloud

Change management related in the planning : How are project management and change management related in the planning and execution of projects/programs?
Target segment identification and selection : Define demographics, psychographics, and market segmentation.
Calculate the value of the company ending inventory : Calculate the value of the company's ending inventory using the lower-of-cost-or-net realizable value method applied to each item of inventory
Create international internship program : The Chairwoman of Board of Directors has selected you to lead the effort to create an international internship program for your organization.
Describe the core security mechanisms : Describe the core security mechanisms that Windows implements to prevent the attacker achieving that goal. Include a brief discussion of the low-level mechanism
What is the payback period for the timco investment : What is the payback period for the Timco investment outlined in #4? What does the payback period calculation mean?
Make a schedule for each month showing budgeted cash : Cash-related production costs are budgeted at $8 per unit produced. Make a schedule for each month showing budgeted cash
Calculate the cost of goods sold and the ending inventory : Calculate the cost of goods sold and the ending inventory cost for the month of June using the weighted-average cost method
Compute the monthly payments alex chong : Using the standard repayment plan and a 6.8 percent APR interest rate, compute the monthly payments Alex Chong owes

Reviews

Write a Review

Other Subject Questions & Answers

  What are the remedies of common law

What are the remedies of common law? Are damages a remedy at law

  Partial explanations for sustainable consumer behavior

Which three schools of academic thinking provide partial explanations for sustainable consumer behavior? Should consumers be expected to take responsibility for the social and environmental impacts of their consumption behaviors, or should that be th..

  What impediments to creativity are present in the scenario

You have just received a promotion to become the supervisor of the public information office for your agency. You are thrilled about your new job and anxiously.

  What effect does ammonium nitrate have on levels of co2

What effect does ammonium nitrate have on levels of CO2 in a bottle of water? What if ammonium nitrate is not at all present in a bottle of water - will this cause CO2 levels to drop?

  Formulating the actual quantitative research question

Use the following questions as guidelines for formulating the actual quantitative research question with respect to the problem that you identify: What is the specific problem? What is the evidence of the problem? What do you suspect is causing the..

  Discuss how hawthorne uses the coming of age theme

Compare how death is depicted in Thanatopsis to how it is depicted in Dickinson's poem #479. Discuss how Hawthorne uses the coming of age theme in "Young Goodman Brown" and "My Kinsman, Major Molineux

  Discuss the situation reflecting on causation

Discuss the situation reflecting on causation, role of social stratification, type of conflict (revolution, civil war, feud), and the resolution or results of the conflict.

  Analyze the psychosocial needs of the selected group

Analyze the psychosocial needs of the selected group. Discuss the issues impacting culturally competent care delivery for the group.

  How does the play resolve the conflict between desire

Write a literary analysis of The Glass Menagerie. Feel free to use the basic APA formatted template - What is the meaning of the menagerie? How does it help us to explain and understand Laura Wingfield?

  Discuss how harm reduction model and abstinence based models

Discuss how the harm reduction model and the abstinence-based models may be appropriate for use with the behavioral addiction you have chosen.

  Create a wage and hour standard for the job opportunity

Create a Wage and Hour standard for the job opportunity that you had selected in Assignment 2, and support your standard by using the Fair Labor Standards Act (FLSA) and Equal Pay Act to prevent any potential discriminatory impact

  Identify and analyze a performance appraisal system

Identify and analyze a performance appraisal system used in a typical organization. Indicate whether the system focuses primarily on traits, behavior, results, organizational goals, or a combination thereof.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd