Discuss the core security mechanisms windows implements

Assignment Help Other Subject
Reference no: EM131251849

Assignment has two sections which are related.

Section 1: 600 words

An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access.

You may assume that:

  • no exploitable vulnerabilities of any kind exist;
  • the attacker has a non-privileged account on the system;
  • basic system access controls do not currently permit the attacker to access the file and the attacker cannot directly change these controls; and
  • the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achieving that goal.

In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer. You may find that the information discussed in lectures and contained in the textbook substantially assist you to frame your answer. However, you may wish to do some additional research. You should include a complete reference list of any additional sources that you have used.

Section 2: 600 words

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons for this failure. Outline an alternative security architecture that could continue to achieve the specified security goal notwithstanding this new scenario. You should include in your discussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist, so you are expected to think creatively about this solution.

Reference no: EM131251849

Questions Cloud

How shall you first approach the client : Address the following questions in Word file.(Maximum one page) Say. it is assumed that you don't know anyone in Panworld. How shall you first approach the client? Say you are able to fix an appointment with the CEO of Panworld, and the meeting is f..
Project to create a change management checklist : Recommend that you lead a project to create a change management checklist that will be rolled out to the managers in your organization.
Calculate the rate of flow of glycerine of density : Calculate the rate of flow of glycerine of density 1.25 x 103 kg/m3 through the conical section of apipe if the radii of its ends are 0.1m & 0.04m and the pressure drop across its length is 10N/m2
Would you recommend any changes for your new target market : Marketing channel strategy. Why type of distribution intensity strategy does your product or service currently use? How do you know this? Would this distribution intensity strategy change for your new target market? Why or why not?
Discuss the core security mechanisms windows implements : An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. Discuss the core security mechanisms Windows implements to prevent the attacker achieving that goal
Find the tensions t1 and t2 in the upper and lower strings : find the tensions T1 and T2 in the upper and lower strings.
Who is the current president of the ioc : Perform an internet search (or visit http://www.olympic.org/en/content/The-IOC/) to answer the following questions. 1. Who is the current President of the IOC? What is his role (hint: defined in the Olympic Charter)? When will there be another ele..
Technology requirements for the health care industry : Identify and analyze what you believe to be the most significant new technology requirements for the health care industry. Indicate how providers should approach the implementation of this new technology requirement that you have identified. Provi..
Analyze how technology has advanced each of their businesses : How technology has advanced each of their businesses, leading to growth. Determine if innovative products, such as Google X, iWatch, or the new Cardboard Bike, can be linked to transformational or transactional leadership. Defend your position.

Reviews

Write a Review

Other Subject Questions & Answers

  Strategic recruiting planning and operational efforts

Describe how employing a large number of new workers requires strategic recruiting planning and operational efforts, and discuss what aspects might be different in smaller firms.

  How is the gender of sexuality

How is the gender of sexuality connected to the gender of the body?

  Describe the corporate responsibilities that were violated

1. describe the corporate responsibilities that were violated in this scenario.2. describe the stakeholders involved.3.

  Fundamental of bussiness system development class

This tutorial contains the Individual Assignment for week 2 of BSA/375 Fundamental of Bussiness System Development class.

  Describe the major provisions and objectives of hitech act

Describe the major provisions and objectives of the HITECH Act. Describe the key requirements of the HITECH Act for health care providers.

  Local supermarket uses the slogan it''s your store

Your local supermarket uses the slogan "It's your store." However, when you asked one of the stock people to help you find a bag of chips he told you it was not his job and that you should look a little harder.

  Hate crimes-definition-offender profile

In many cities throughout the United States, the prevalence of hate crimes has raised. You've been asked to provide your insight in this and recommend ways to reduce the occurrence of these types of crimes.

  Magnolia therapeutic solutions case

Resource: Magnolia Therapeutic Solutions Case. Read the Magnolia Therapeutic Solutions Case located on the student website.

  What is the military decision making process

What is the Military Decision Making Process? Why do you need to know the MDMP? How much time is given for the execution and planning during the MDMP process? Why?

  What is the definition of management of change

What is the definition of Management of Change

  Oral promises between unmarried cohabitants to be valid

On what occasion would the court's early decision preclude the enforcement of any agreement between unmarried parties? What was required in more recent decisions for oral promises between unmarried cohabitants to be valid?

  Describe how a company designs a pay structure

Describe how a company designs a pay structure, and evaluate how to make sure pay structure is in line with actual pay.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd