Can capabilities protect against all trojan horses

Assignment Help Software Engineering
Reference no: EM13311665

1. A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, the en add more code, then test, and continue this iteration. Every day they test the code base as a whole. The programmers work in pairs when writing code to ensure that at least two people review the code. How would you explain to this company how their software is in fact not high assurance" software?

2. Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

A) In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists

B) Consider now the inheritance of properties of new processes. If the creator controls which capabilities the created process is given initially, how could the creator limit a damage that a Trojan Horse will do?

C) Can capabilities protect against all Trojan Horses? Either show that they can or describe a Trojan horse process that can C-Lists cannot protect against.

 

 


Attachment:- Computer-Security-Art--and--Science-Questions--for-transtutors.docx

Reference no: EM13311665

Questions Cloud

Led is blinking a different color than usual : 1. Joe has just moved his PC to his new offce. After hooking up all the cables, he turns on the system, and when it asks for his password, the keyboard will not respond. What could possibly be wrong?
What is the force constant of this spring : An unstretched spring is 13.0 cm long. When you hang an 845 g weight from it, it stretches to a length of 16.0 cm. What is the force constant (in N/m) of this spring
Choose an information system for an individual project : Choose an information system for an individual project.
Find the acceleration of this skier : A skier approaches the base of an icy, frictionless hill with a speed of 13.4m/s . The hill slopes upward at 24.0^\circ above the horizontal. Find the acceleration of this skier
Can capabilities protect against all trojan horses : A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, the en add more code, then test, and continue this iteration.
What is the acceleration due to gravity on the asteroid : If the period of a 10-m long pendulum is 18 s on an asteroid, then what is the acceleration due to gravity on the asteroid
Find the potential energy stored in the spring : A 0.50 kg mass is attached to a spring of spring constant 20 N/m along a horizontal, frictionless surface. Find the potential energy stored in the spring when the mass is at its maximum displacement
Explain the steps required to file a civil lawsuit : Explain the steps required to file a civil lawsuit against a supplier to supply parts that work
Construct relational database for new yorks fire department : The state wants to record fire department for which each fire fighter currently works and each fire fighter's supervisor. Supervisors are always higher-ranking certified fire fighters - Construct relational database for New York's fire departments..

Reviews

Write a Review

 

Software Engineering Questions & Answers

  Importance of udp and the relationship to tcp

Discuss and explain what the UDP does and its relationship to TCP in what ways is it similar and different, and why would we use UDP, and why can not a user program access IP directly?

  Using pseudocode to design a suitable program

he manager of the Supermarket would like to be able to calculate the unit price for items sold there. To do this, the program should input name and price of an product and its weight in pounds and ounces.

  Assign resources to processes for k processes will be active

Given a set of process and resources, set of requested resources for each process, and number k, is it possible to assign resources to processes so that at least k processes will be active?

  Draw a dfd for placing an order

Draw a  DFD (Context and  Level 1) for placing an order based on the E-R diagram shown here.

  Different approaches for system development

In Systems Analysis and Design. There are at least 2 approaches to system development, variety of life cycles, and long list of techniques.

  Describe five forces of porter-s competitive forces model

Describe each of the five forces of Porter's competitive forces model and explain how Internet impacts each one. List and explain each of the six steps of knowledge management system cycle.

  Who is your target market

Who is your target market? Have you considered the accessibility of your site for people with a disability, such as sight impairment and an analysis of needs should include the business enterprise requirements as well as the customer demand.

  Tcp sender and receiver sequence

Think about a TCP sender and receiver. Suppose bytes 0 .. 99 have been sent, received, and acknowledged (the sender has received ack's for them). Suppose the sender sends the following segments

  Draw a context diagram for the order system

Kitchen Gadgets sells a line of high-quality kitchen utensils and gadgets. When customers place orders on the company's Web site or through electronic data interchange

  Developing soa based it solutions

This Discussion will focus on the different levels of abstractions within the service interface layer and importance of abstraction and role of layering when constructing SOA-based IT solutions.

  Flowchart for physical goods are shipped back to supplier

Sketch a document flowchart to depict each situations: Physical goods are shipped back to the supplier.

  Draw class diagram for computing machine

Each problem reported by a distinct user is assigned a unique problem number (even if different users call in to report the same problem). Draw a class diagram that accurately reflects the system's requirements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd