Discuss the core security mechanisms

Assignment Help Computer Engineering
Reference no: EM131248820

Section 1:

An attacker seeks to view the contents of a specific Microsoft Word document file to whichthey do not have any kind of access.
You may assume that:
- no exploitable vulnerabilities of any kind exist;
- the attacker has a non-privileged account on the system;
- basic system access controls do not currently permit the attacker to access the file andthe attacker cannot directly change these controls; and
- the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal.

In completing this task, you must use an approach based on the architectural divisionsdiscussed during lectures to organise your answer. You may find that the informationdiscussed in lectures and contained in the textbook substantially assist you to frame youranswer. However, you may wish to do some additional research. You should include acomplete reference list of any additional sources that you have used.

Component Percentage

Subject credentials management/assignment discussion
Operation of access control mechanisms
Low level security mechanisms
Clarity and quality of writing, including organisation and evidence of research where necessary.

word count - 1600

Section 2:

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario. You should include in yourdiscussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist, so you are expected to think creatively about this solution.

Component Percentage
Discussion of failure of existing architectures
Description of security architecture
Discussion of limitations
Clarity and quality of writing, including organisation and evidence of research where necessary.

Reference no: EM131248820

Questions Cloud

Analyze proper physical access control safeguards : Suggest three (3) logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method. Analyze the means in which data moves within the organization and identify techniq..
Calculate the mean and variance of all activities : Assume the McWaffl e project above contained some uncertain activity times as shown below. Calculate the mean and variance of all activities, and determine the probability of completing the project within 20 days without crashing any activities.
Find bobs key for example and compute the number : Factor:- -Find Bob's key for example and compute the number he would give to Alice if she changed her offer to $1,200.
What are your reasons for buying a franchise : What are your reasons for buying a franchise? Are you interested in retail sales or performing a service? Most franchises are for at least ten years. Are you in this for the long term?
Discuss the core security mechanisms : Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal - Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure
What new technologies being developed in computer industry : Where do you see Business Intelligence and related technology 5 or 10 years from? What new technologies are being developed in the computer industry and how can those technologies be utilized for business and process analysis?
Review three videos of teachers teaching fractions : Visit the Teaching Channel website and review three videos of teachers teaching fractions. Write a 250-500 word review of what you observed and support your review with references to the assigned readings.
Draw the project network showing the activities : Draw the project network showing the activities with their expected times.
How is a nsaid different than acetaminophen : How is a NSAID different than Acetaminophen? What symptoms would each of these, acetaminophen, naproxen, aspirin, and ibuprofen, best treat?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What role each play in failed projects

What character does each of the following play in failed projects.

  Analyse how data warehouses and data marts differ

Analyse how data warehouses and data marts differ. Explain 2-3 practical applications for each of them and justify your reasoning.

  Question 1a define the term concurrency and no global clock

question 1a define the term concurrency and no global clock in distributed systemsb transparency is defined as the

  Evaluate the ethical concerns that information systems

write a 4-5 page research paper in which you present a summary of the issue. express your own opinion or position on

  Create a set of use cases for accompanying dentist system

Create a set of use cases for the accompanying dentist office system, but do not bother to identify the steps within each use case.

  Registers and risc processor

A RISC processor has 152 total registers, along with the 12 designated as global registers.

  Write down a simple java payroll code

Write down a simple Java payroll code. It needs to ask for the employee name, hours worked, and hourly rate.

  Analyze the history of broadband and the emergence services

Analyze the history of broadband and the emergence of integrated services digital network (ISDN), Digital Subscriber Line (DSL), and digital mobile video broadcasts.

  How do you include a loop structure programming in python

Explain when we would use each. How do you include a ‘loop' structure programming in Python? How do you control a loop? What you found that was new and exciting that you plan to use personally.

  State how you would recover an actual set s

Prove accuracy of your greedy algorithm by stating and proving the loop invariant.State how you would recover an actual set S.

  Determine which company the customer could buy each item

Design a polynomial time algorithm to determine which company the customer could buy each item from to minimize her total cost.

  Fiber used in the desktop to the lan closet switch

What type of transmission do most people use at home or work?fiber used in the desktop to the LAN closet switch?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd