Discuss the core security mechanisms windows implements

Assignment Help Other Subject
Reference no: EM131251849

Assignment has two sections which are related.

Section 1: 600 words

An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access.

You may assume that:

  • no exploitable vulnerabilities of any kind exist;
  • the attacker has a non-privileged account on the system;
  • basic system access controls do not currently permit the attacker to access the file and the attacker cannot directly change these controls; and
  • the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achieving that goal.

In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer. You may find that the information discussed in lectures and contained in the textbook substantially assist you to frame your answer. However, you may wish to do some additional research. You should include a complete reference list of any additional sources that you have used.

Section 2: 600 words

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons for this failure. Outline an alternative security architecture that could continue to achieve the specified security goal notwithstanding this new scenario. You should include in your discussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist, so you are expected to think creatively about this solution.

Reference no: EM131251849

Questions Cloud

How shall you first approach the client : Address the following questions in Word file.(Maximum one page) Say. it is assumed that you don't know anyone in Panworld. How shall you first approach the client? Say you are able to fix an appointment with the CEO of Panworld, and the meeting is f..
Project to create a change management checklist : Recommend that you lead a project to create a change management checklist that will be rolled out to the managers in your organization.
Calculate the rate of flow of glycerine of density : Calculate the rate of flow of glycerine of density 1.25 x 103 kg/m3 through the conical section of apipe if the radii of its ends are 0.1m & 0.04m and the pressure drop across its length is 10N/m2
Would you recommend any changes for your new target market : Marketing channel strategy. Why type of distribution intensity strategy does your product or service currently use? How do you know this? Would this distribution intensity strategy change for your new target market? Why or why not?
Discuss the core security mechanisms windows implements : An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. Discuss the core security mechanisms Windows implements to prevent the attacker achieving that goal
Find the tensions t1 and t2 in the upper and lower strings : find the tensions T1 and T2 in the upper and lower strings.
Who is the current president of the ioc : Perform an internet search (or visit http://www.olympic.org/en/content/The-IOC/) to answer the following questions. 1. Who is the current President of the IOC? What is his role (hint: defined in the Olympic Charter)? When will there be another ele..
Technology requirements for the health care industry : Identify and analyze what you believe to be the most significant new technology requirements for the health care industry. Indicate how providers should approach the implementation of this new technology requirement that you have identified. Provi..
Analyze how technology has advanced each of their businesses : How technology has advanced each of their businesses, leading to growth. Determine if innovative products, such as Google X, iWatch, or the new Cardboard Bike, can be linked to transformational or transactional leadership. Defend your position.

Reviews

Write a Review

Other Subject Questions & Answers

  Describe how the principals of access control matrices

Describe how the principals of access control matrices and least privilege aid the creation of protection systems?

  Calculation and interpretation of ratios

Discuss what needs to be completed, besides the calculation and interpretation of ratios, to complete an effective financial ratio analysis.

  What are idea requirements regarding parental involvement

What are IDEA's requirements regarding parental involvement in the IEP process? Explain what IDEA 2004 requires regarding the use of high stakes testing with children with disabilities.

  Characteristics of proprietorships-corporate form

The primary advantage of the proprietor form of business over the corporate form. All of the following are characteristics of proprietorships except: The principal financial advantage of the corporate form of organization is

  Implement the concept of incorporating community

Assess two techniques by which teachers can implement the concept of incorporating community knowledge into the curriculum in terms of the likelihood of advancing school reform in a multicultural and global fashion.

  Discuss principles that characterize a empowerment approach

Discuss the principles that characterize an empowerment approach to human service management. Evaluate how you might apply these principles to the developmental processes of your own Ideal human service organization.

  Briefly describe the processes of carbohydrate digestion

Explain the effect smoking has on the body's ability to move material trapped in the respiratory mucosa. What is hepatitis? What are the signs and symptoms of hepatitis? Briefly describe the processes of carbohydrate digestion, fat digestion, and pr..

  Ascertaining social class

Supose that you were trying to assess the person's social class. Answer the following four questions: Are there any other observations that you could make from an individual's appearance that can provide you with evidence of an individual's social ..

  Describe the theory of classical conditioning

Select a scenario in which you would apply classical conditioning theory, such as training your dog to sit or training your partner to clean the house.

  Characteristics and purposes of prisons

Outline the major characteristics and purposes of prisons, including prisoners' rights and prison society. Use technology and information resources to research issues in criminal justice.

  Law regarding union recognition for public employees

How does the law regarding union recognition for public employees in this state compare with the NLRA rules regarding union recognition for private-sector employees?

  Describe the types of questions

Describe the types of questions that you asked yourself to ensure that you used critical thinking in your research and analysis of the problem.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd