Discuss the core security mechanisms

Assignment Help Computer Engineering
Reference no: EM131248820

Section 1:

An attacker seeks to view the contents of a specific Microsoft Word document file to whichthey do not have any kind of access.
You may assume that:
- no exploitable vulnerabilities of any kind exist;
- the attacker has a non-privileged account on the system;
- basic system access controls do not currently permit the attacker to access the file andthe attacker cannot directly change these controls; and
- the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal.

In completing this task, you must use an approach based on the architectural divisionsdiscussed during lectures to organise your answer. You may find that the informationdiscussed in lectures and contained in the textbook substantially assist you to frame youranswer. However, you may wish to do some additional research. You should include acomplete reference list of any additional sources that you have used.

Component Percentage

Subject credentials management/assignment discussion
Operation of access control mechanisms
Low level security mechanisms
Clarity and quality of writing, including organisation and evidence of research where necessary.

word count - 1600

Section 2:

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario. You should include in yourdiscussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist, so you are expected to think creatively about this solution.

Component Percentage
Discussion of failure of existing architectures
Description of security architecture
Discussion of limitations
Clarity and quality of writing, including organisation and evidence of research where necessary.

Reference no: EM131248820

Questions Cloud

Analyze proper physical access control safeguards : Suggest three (3) logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method. Analyze the means in which data moves within the organization and identify techniq..
Calculate the mean and variance of all activities : Assume the McWaffl e project above contained some uncertain activity times as shown below. Calculate the mean and variance of all activities, and determine the probability of completing the project within 20 days without crashing any activities.
Find bobs key for example and compute the number : Factor:- -Find Bob's key for example and compute the number he would give to Alice if she changed her offer to $1,200.
What are your reasons for buying a franchise : What are your reasons for buying a franchise? Are you interested in retail sales or performing a service? Most franchises are for at least ten years. Are you in this for the long term?
Discuss the core security mechanisms : Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal - Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure
What new technologies being developed in computer industry : Where do you see Business Intelligence and related technology 5 or 10 years from? What new technologies are being developed in the computer industry and how can those technologies be utilized for business and process analysis?
Review three videos of teachers teaching fractions : Visit the Teaching Channel website and review three videos of teachers teaching fractions. Write a 250-500 word review of what you observed and support your review with references to the assigned readings.
Draw the project network showing the activities : Draw the project network showing the activities with their expected times.
How is a nsaid different than acetaminophen : How is a NSAID different than Acetaminophen? What symptoms would each of these, acetaminophen, naproxen, aspirin, and ibuprofen, best treat?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Who has held the one-year position for the past four years

Although everything was fine five minutes ago, a secretary cannot get her computer to send a document to the printer. The document must be printed for the meeting her boss has scheduled to begin in fifteen minutes. (Kirby & Goodpaster, 2007. The i..

  Critically evaluate why or why not given statement is valid

Critically evaluate why, or why not, the statement, ‘There are no unusual managerial issues related to the introduction of client/server systems,' is valid.

  Design a program that would keep track of his clients

design a program that would keep track of his clients.

  What are the strengths of the tool belt approach

What are the strengths of the "tool belt" approach to digital forensics? Are there any weaknesses? Discuss these questions thoroughly in your Conference response, and respond to at least one other student's original post in a way that adds to the..

  Write the program in java

Write the program in Java (with a graphical user interface) so that it would allow the user to select which way they want to calculate a mortgage: by input of the amount of the mortgage.

  Categorizing the threat

Download a password cracker developed for your operating system. Run the cracker on your system. Describe the results from cracker.

  What is the optimal production schedule for this firm

What is the optimal production schedule for this firm? What is the profit contribution of each of these products? What is the marginal value of an additional hour of time on machine 1? Over what range of time is this marginal value valid

  What is missing, incomplete, inaccurate

Email clients have to enable SSL encryption both for POP and SMTP. That way regardless of where we work, our email traffic would not expose any data to network eavesdropping techniques.

  Perform the subtraction

Perform the subsequent subtraction using 1's compliment and 2's compliment.

  Getters would provide access to the attributes.

For this task you will make a Subject class, whose instances will represent the subjects for study at a university. A subject will have a name, just a String, and a subject code, that is a six-character String.

  You have been asked to be the project manager for the

you have been asked to be the project manager for the development of an information technology it project. the system

  Draw the binary tree that allocations create

Listing the nodes in the order of their visit for an LNR (inorder) scan.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd