Reference no: EM131251849
Assignment has two sections which are related.
Section 1: 600 words
An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access.
You may assume that:
- no exploitable vulnerabilities of any kind exist;
- the attacker has a non-privileged account on the system;
- basic system access controls do not currently permit the attacker to access the file and the attacker cannot directly change these controls; and
- the attacker cannot physically tamper with the system in any way.
Discuss the core security mechanisms Windows implements to prevent the attacker achieving that goal.
In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer. You may find that the information discussed in lectures and contained in the textbook substantially assist you to frame your answer. However, you may wish to do some additional research. You should include a complete reference list of any additional sources that you have used.
Section 2: 600 words
Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.
Discuss briefly how the above outlined security mechanisms would fail, and the reasons for this failure. Outline an alternative security architecture that could continue to achieve the specified security goal notwithstanding this new scenario. You should include in your discussion of the security limitations of your approach.
Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist, so you are expected to think creatively about this solution.
How shall you first approach the client
: Address the following questions in Word file.(Maximum one page) Say. it is assumed that you don't know anyone in Panworld. How shall you first approach the client? Say you are able to fix an appointment with the CEO of Panworld, and the meeting is f..
|
Project to create a change management checklist
: Recommend that you lead a project to create a change management checklist that will be rolled out to the managers in your organization.
|
Calculate the rate of flow of glycerine of density
: Calculate the rate of flow of glycerine of density 1.25 x 103 kg/m3 through the conical section of apipe if the radii of its ends are 0.1m & 0.04m and the pressure drop across its length is 10N/m2
|
Would you recommend any changes for your new target market
: Marketing channel strategy. Why type of distribution intensity strategy does your product or service currently use? How do you know this? Would this distribution intensity strategy change for your new target market? Why or why not?
|
Discuss the core security mechanisms windows implements
: An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. Discuss the core security mechanisms Windows implements to prevent the attacker achieving that goal
|
Find the tensions t1 and t2 in the upper and lower strings
: find the tensions T1 and T2 in the upper and lower strings.
|
Who is the current president of the ioc
: Perform an internet search (or visit http://www.olympic.org/en/content/The-IOC/) to answer the following questions. 1. Who is the current President of the IOC? What is his role (hint: defined in the Olympic Charter)? When will there be another ele..
|
Technology requirements for the health care industry
: Identify and analyze what you believe to be the most significant new technology requirements for the health care industry. Indicate how providers should approach the implementation of this new technology requirement that you have identified. Provi..
|
Analyze how technology has advanced each of their businesses
: How technology has advanced each of their businesses, leading to growth. Determine if innovative products, such as Google X, iWatch, or the new Cardboard Bike, can be linked to transformational or transactional leadership. Defend your position.
|