Discuss briefly how the above outlined security mechanisms

Assignment Help Other Subject
Reference no: EM131305595 , Length: word count:1200

An attacker seeks to view the contents of a specific Microsoft Word document file to whichthey do not have any kind of access.

You may assume that:
- no exploitable vulnerabilities of any kind exist;
- the attacker has a non-privileged account on the system;
- basic system access controls do not currently permit the attacker to access the file andthe attacker cannot directly change these controls; and
- the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal.

In completing this task, you must use an approach based on the architectural divisionsdiscussed during lectures to organise your answer. You may find that the informationdiscussed in lectures and contained in the textbook substantially assist you to frame youranswer. However, you may wish to do some additional research. You should include acomplete reference list of any additional sources that you have used.

Component Percentage

Subject credentials management/assignment discussion 15%

Operation of access control mechanisms 15%

Low level security mechanisms 15%

Clarity and quality of writing, including organisation and evidence of research where necessary.

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario. You should include in yourdiscussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative securityarchitecture may or may not exist, so you are expected to think creatively about this solution.
Component Percentage
Discussion of failure of existing architectures
Description of security architecture
Discussion of limitations
Clarity and quality of writing, including organisation and evidence of research where necessary.

Reference no: EM131305595

Questions Cloud

Define faying surface and friction-type joint : Define a shear joint? Define an axial shear joint? Define faying surface? Define friction-type joint? Define bearing-type joint? Draw a graph illustrating the way a shear joint fails? Is bolt preload important in a shear joint? If so, why? If no..
Difference between a pretension and a slip-critical joint : What is the difference between a pretension and a slip-critical joint? Under what conditions is it acceptable to only snug-tighten the bolts in a joint?
Discuss key points about the function : Discuss key points about the function,Describe how employment works in coordination with the other functions of human resources,Do you think it is an important area, why or why not?,If not, which area do you think is more important and why?
A house or a flock can produce new value by use : Why would money being barren mean that lenders should not charge interest on loans? Do you agree with Aristotle's reasoning? Briefly explain.
Discuss briefly how the above outlined security mechanisms : Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario.
What about the design made the team successful : Different levels of rewards should be used to recognize different accomplishments and degrees of accomplishment.Communication of the award to the team and/or individuals should be a prepared event and/or communicated clearly.
Define the time value of money and present value : Define the Time value of money, Present value and Discounting- How is the price of a financial asset related to the payments to be received from owning it?
What are main reasons that lenders charge interest on loans : What are the main reasons that lenders charge interest on loans?- Give an example of a financial transaction that requires a payment in the future.
What policies led to given inflation rate : Go to the World Bank's quick query data tool and select Zimbabwe and then inflation. Graph Zimbabwe's inflation rate. What policies led to this inflation rate?

Reviews

len1305595

12/8/2016 7:30:57 AM

Component Percentage Subject credentials management/assignment discussion 15% Operation of access control mechanisms 15% Low level security mechanisms 15% Clarity and quality of writing, including organisation and evidence of research where necessary. 5% Component Percentage Discussion of failure of existing architectures 10% Description of security architecture 20% Discussion of limitations 15% Clarity and quality of writing, including organisation and evidence of research where necessary. 5%

Write a Review

 

Other Subject Questions & Answers

  What philosophical implications associated with each option

How does this question relate to the Divine Command Theory of morality? What are the philosophical implications associated with each option here?

  Explain the social context of the social issue

Select and research a social issue based on the course readings or personal interest -  Define and describe the social issue in detail using a variety of relevant outside sources.

  Develop appropriate formulas for determining the total

as with all insurance policies the insurance premium charged depends on the insurance companys cost experience over the

  Analysis of cost versus care

Please answer the question after reading the case presentation. Please provide two paragraphs. Please also give references in regards to the topic and do not include websites.

  Discuss importance of building relationships with families

Discuss importance of building relationships with families. Analyze which parenting styles these strategies will align with and provide a rationale as to why.

  What are the three types of drinking water advisories

What were the European childhood diseases that became epidemics in Anishinabe homelands in what is now Canada because people had no immunity to these pathogens?

  Fitness and nutritional habits

Explain your fitness and nutritional habits. Also, briefly explain some of the health risk associated with obseity.

  Legal curfews or restricted driving privileges

1. Should people under 18 be subjected to legal curfews or restricted driving privileges?

  Differentiate in patient to die-physician-assisted suicide

Differentiate between allowing a patient to die and physician-assisted suicide. What are the legal implications of the two concepts? What moral implications do they have? Why are doctors reluctant to abide by patient or family wishes to stop life sup..

  What surprised you the most about the presentation

Considering Dr. Turkle's argument as one aspect of the larger context of communication as a key skill of effective leaders, what areas of communication do you feel need to improve? And briefly outline your strategy for improvement.

  Psychologists define personality

Researchers use a number of different methods to study personality. Three of the most commonly used methods are case studies, correlational designs, and experimental designs or true experime

  How the requirements of the target population influenced

in your first two project assignments you identified a culturally diverse target population proposed advocacy

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd