ICT379 Security Architectures Assignment

Assignment Help Computer Network Security
Reference no: EM132410870 , Length: word count:2000

ICT379 Security Architectures Assignment

Part I -

An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access.

You may assume that:

- no exploitable vulnerabilities of any kind exist;

- the attacker has a non-privileged account on the system;

- basic system access controls do not currently permit the attacker to access the file and the attacker cannot directly change these controls; and

- the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achieving that goal.

In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer. You may find that the information discussed in lectures and contained in the textbook substantially assist you to frame your answer. However, you may wish to do some additional research. You should include a complete reference list of any additional sources that you have used.

Part II -

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons for this failure. Outline an alternative security architecture that could continue to achieve the specified security goal notwithstanding this new scenario. You should include in your discussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist, so you are expected to think creatively about this solution.

Reference no: EM132410870

Questions Cloud

Forward contract and currency futures contract : Compare and contrast a currency forward contract and a currency futures contract.
Repurchase the outstanding shares : What will the value be if it borrows $100,000 and repurchase the outstanding shares c) and the cost of equity, WACC after recapitalization?
What additional factors would you take into consideration : In making a choice after your analysis in part (i) above, what additional factors would you take into consideration, and why?
Prevent further depreciation of a currency : Clearly illustrate how the Central bank could use sterilized intervention to prevent further depreciation of a currency?
ICT379 Security Architectures Assignment : ICT379 Security Architectures Assignment Help and Solution. Discuss the core security mechanisms Windows implements to prevent the attacker achieving that goal
Current market price does this offer? represent : What happens to the price of ABC and XYZ this? time? What premium over the current market price does this offer? represent?
What is the total profit on investment : Assume that you purchased 200 shares of C-Mac Industries stock for $110 a share, that you received an annual dividend of $4.00 a share
Possible one-penny rounding issue : An account starts with a value of $6,800. It earns 5.1%, compounded monthly. $100 is added to the account at the end of each month.
What would the monthly payment : In 37 years, if the total balance of the account is annuitized, what would the monthly payment be if the annuity is to last for 32 years

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a reseach paper on host intrusion detection systems

Write a reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems. Computer Virus creates major headaches for most organizations, as this list of 10 worst PC virus outbreaks shows.

  Developing a security evaluation process

You are responsible for developing a security evaluation process that can be used to assess various operating systems both during and after development.

  Theft of logins and passwords

Theft of logins and passwords

  What is the history of des and why is s-des studied

What is the history of DES, and why is s-DES studied? How does DES and 3DES work? Provide an example of each

  Analyze proper physical access control safeguards and

imagine you are an information security consultant for a small doctors office consisting of three 3 doctors two 2

  How does the event relate to issues addressed in cyber

Find a Cybersecurity-related current event, activity, or development in the news, briefly summarize the event and reflect on its significance, How does the event relate to issues addressed in cyber

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  Identify steps required for implementing a security program

Identify three steps required for implementing a physical and environmental security program. Explain how you would factor risk management practices into the development of the policies you constructed above.

  Nap to reduce security risks

You discover that many of your company's customers have been responsible for introducing viruses and malware into the company network via the Internet

  Identify and describe the organizational authentication

Identify and describe the organizational authentication technology and network security issues

  Identify 3 different computer crimes that you are aware

computer crime has become a serious matter for your discussion board post consider the following do you think computer

  What are the costs of the advertised security training

What are the costs of the advertised security training? Network certification? General computer training?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd