Discuss briefly how the above outlined security mechanisms

Assignment Help Other Subject
Reference no: EM131305595 , Length: word count:1200

An attacker seeks to view the contents of a specific Microsoft Word document file to whichthey do not have any kind of access.

You may assume that:
- no exploitable vulnerabilities of any kind exist;
- the attacker has a non-privileged account on the system;
- basic system access controls do not currently permit the attacker to access the file andthe attacker cannot directly change these controls; and
- the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal.

In completing this task, you must use an approach based on the architectural divisionsdiscussed during lectures to organise your answer. You may find that the informationdiscussed in lectures and contained in the textbook substantially assist you to frame youranswer. However, you may wish to do some additional research. You should include acomplete reference list of any additional sources that you have used.

Component Percentage

Subject credentials management/assignment discussion 15%

Operation of access control mechanisms 15%

Low level security mechanisms 15%

Clarity and quality of writing, including organisation and evidence of research where necessary.

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario. You should include in yourdiscussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative securityarchitecture may or may not exist, so you are expected to think creatively about this solution.
Component Percentage
Discussion of failure of existing architectures
Description of security architecture
Discussion of limitations
Clarity and quality of writing, including organisation and evidence of research where necessary.

Reference no: EM131305595

Questions Cloud

Define faying surface and friction-type joint : Define a shear joint? Define an axial shear joint? Define faying surface? Define friction-type joint? Define bearing-type joint? Draw a graph illustrating the way a shear joint fails? Is bolt preload important in a shear joint? If so, why? If no..
Difference between a pretension and a slip-critical joint : What is the difference between a pretension and a slip-critical joint? Under what conditions is it acceptable to only snug-tighten the bolts in a joint?
Discuss key points about the function : Discuss key points about the function,Describe how employment works in coordination with the other functions of human resources,Do you think it is an important area, why or why not?,If not, which area do you think is more important and why?
A house or a flock can produce new value by use : Why would money being barren mean that lenders should not charge interest on loans? Do you agree with Aristotle's reasoning? Briefly explain.
Discuss briefly how the above outlined security mechanisms : Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario.
What about the design made the team successful : Different levels of rewards should be used to recognize different accomplishments and degrees of accomplishment.Communication of the award to the team and/or individuals should be a prepared event and/or communicated clearly.
Define the time value of money and present value : Define the Time value of money, Present value and Discounting- How is the price of a financial asset related to the payments to be received from owning it?
What are main reasons that lenders charge interest on loans : What are the main reasons that lenders charge interest on loans?- Give an example of a financial transaction that requires a payment in the future.
What policies led to given inflation rate : Go to the World Bank's quick query data tool and select Zimbabwe and then inflation. Graph Zimbabwe's inflation rate. What policies led to this inflation rate?

Reviews

len1305595

12/8/2016 7:30:57 AM

Component Percentage Subject credentials management/assignment discussion 15% Operation of access control mechanisms 15% Low level security mechanisms 15% Clarity and quality of writing, including organisation and evidence of research where necessary. 5% Component Percentage Discussion of failure of existing architectures 10% Description of security architecture 20% Discussion of limitations 15% Clarity and quality of writing, including organisation and evidence of research where necessary. 5%

Write a Review

Other Subject Questions & Answers

  Paragraph using appropriate connectors.

“Each of the Russian manned space exploration projects had specific major goals. The Vostok project was designed to test whether or not human beings could survive and function in outer space. The Voshkhod project was intended to find out whether peop..

  Describe elements of conflict resolution and peacemaking

Locate an article concerning conflict resolution and peacemaking using the course readings, the University Library, and other resources. Prepare a 900-word paper in which you analyze your article. Describe elements of conflict resolution and peacema..

  Contending theories of causes of cold war

Discuss contending theories of causes of Cold War. What are they? Which theory do you find most persuasive, and why? Describe the long-cycle theory and discuss the possible implications the peaceful end of the Cold War might have on this theory.

  How medical conditions might mimic psychological disorders

Can someone help me with an example of how medical conditions might mimic psychological disorders?

  What remedies does he have for the faulty heater

Steve is renting a property from Billy. One evening Steve tripped and fell down the stairs. The issue is that one of the stairs in the common area was faulty. Billy knew about the stair, but he had never got around to fixing it. What remedies doe..

  Hate crimes against african americans

Why do you think that so little research has focused on hate crimes against African Americans? What would you propose as a solution to this problem?

  Describe in detail the prototype

Describe in detail the prototype, including their appearance and personality characteristics of High School Students who are cheerleaders.

  What is a two-level drama

What is a two-level drama? What does the two-level drama suggest about how we should read the gospels in our churches today?

  Categories of punishment might include loss of right to vote

Which of the following categories of punishment might include the loss of the right to vote? The argument that crime is not a result of poverty or social conditions and therefore cannot be affected by social programs was made by

  Limited-liability protection and double taxation

Create a table comparing a regular corporation, an S-corporation, and a limited-liability company on these dimensions: limited-liability protection, double taxation, restrictions on the number of stockholders or members, rules, and restrictions. If y..

  Discuss difference between a push poll and scientific survey

Discuss the difference between a push poll and a scientific survey. Which of these two types of polls provide more reliable information to politicians and policy makers, and why?

  What is intensified continuity in what ways does this

1.how did the policies of synergy and high concept transform american film industry structure in the 1980s and 1990s?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd