Discuss briefly how the above outlined security mechanisms

Assignment Help Other Subject
Reference no: EM131305595 , Length: word count:1200

An attacker seeks to view the contents of a specific Microsoft Word document file to whichthey do not have any kind of access.

You may assume that:
- no exploitable vulnerabilities of any kind exist;
- the attacker has a non-privileged account on the system;
- basic system access controls do not currently permit the attacker to access the file andthe attacker cannot directly change these controls; and
- the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal.

In completing this task, you must use an approach based on the architectural divisionsdiscussed during lectures to organise your answer. You may find that the informationdiscussed in lectures and contained in the textbook substantially assist you to frame youranswer. However, you may wish to do some additional research. You should include acomplete reference list of any additional sources that you have used.

Component Percentage

Subject credentials management/assignment discussion 15%

Operation of access control mechanisms 15%

Low level security mechanisms 15%

Clarity and quality of writing, including organisation and evidence of research where necessary.

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario. You should include in yourdiscussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative securityarchitecture may or may not exist, so you are expected to think creatively about this solution.
Component Percentage
Discussion of failure of existing architectures
Description of security architecture
Discussion of limitations
Clarity and quality of writing, including organisation and evidence of research where necessary.

Reference no: EM131305595

Questions Cloud

Define faying surface and friction-type joint : Define a shear joint? Define an axial shear joint? Define faying surface? Define friction-type joint? Define bearing-type joint? Draw a graph illustrating the way a shear joint fails? Is bolt preload important in a shear joint? If so, why? If no..
Difference between a pretension and a slip-critical joint : What is the difference between a pretension and a slip-critical joint? Under what conditions is it acceptable to only snug-tighten the bolts in a joint?
Discuss key points about the function : Discuss key points about the function,Describe how employment works in coordination with the other functions of human resources,Do you think it is an important area, why or why not?,If not, which area do you think is more important and why?
A house or a flock can produce new value by use : Why would money being barren mean that lenders should not charge interest on loans? Do you agree with Aristotle's reasoning? Briefly explain.
Discuss briefly how the above outlined security mechanisms : Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario.
What about the design made the team successful : Different levels of rewards should be used to recognize different accomplishments and degrees of accomplishment.Communication of the award to the team and/or individuals should be a prepared event and/or communicated clearly.
Define the time value of money and present value : Define the Time value of money, Present value and Discounting- How is the price of a financial asset related to the payments to be received from owning it?
What are main reasons that lenders charge interest on loans : What are the main reasons that lenders charge interest on loans?- Give an example of a financial transaction that requires a payment in the future.
What policies led to given inflation rate : Go to the World Bank's quick query data tool and select Zimbabwe and then inflation. Graph Zimbabwe's inflation rate. What policies led to this inflation rate?

Reviews

len1305595

12/8/2016 7:30:57 AM

Component Percentage Subject credentials management/assignment discussion 15% Operation of access control mechanisms 15% Low level security mechanisms 15% Clarity and quality of writing, including organisation and evidence of research where necessary. 5% Component Percentage Discussion of failure of existing architectures 10% Description of security architecture 20% Discussion of limitations 15% Clarity and quality of writing, including organisation and evidence of research where necessary. 5%

Write a Review

Other Subject Questions & Answers

  Is the independent variable manipulated or not manipulated

A researcher examines whether length of daily exposure to a sun lamp (0 minutes, 30 minutes, or 60 minutes) influences self-reported depression (measured as either "depressed" or "not depressed"). Is the independent variable manipulated or not mani..

  Assessing credibility and reliability of sources

Create a 12-slide Microsoft® PowerPoint® presentation on a methodology you create for assessing credibility and reliability of sources of CAM information. Include detailed speaker notes and reference citations.

  Provide and promote health and it incumbent upon individuals

In other words, the government, health care providers, etc. can only do so much to provide and promote health and it is incumbent upon the individuals within the population to supplement those efforts by making healthier decisions and taking care ..

  Culture of wal-marts of ten impose western culture

Culture of Wal-marts of ten impose western culture on the country in which the business is aunched. Locate an article that contains a similar situation as walmart and summarize the findings

  Discuss the shared experiences of members of your cohort

Tasks: Write a 2- to 3-page reflection paper and discuss the shared experiences of members of your cohort. Your paper should be based on your personal experiences as well as research on your generational cohort

  Business has enough power-additional social involvement

Business has a great deal of power that,it is reasoned,should be accompanied by an equal amount of responsibility. Business has enough power and additional social involvement would further increase its power and influence.

  What purpose does maya angelou''s story have for readers

What purpose does Maya Angelou's story have for readers. If you had to cast the movie version of this story, who would play the characters of Marguerite, Mrs. Flowers, and Mrs. Henderson. How does Mrs. Flowers challenge Marguerite to start talking ..

  Multicentric and unicentric political organization

The difference between multicentric and unicentric political organization?

  Describe a research study that used human subjects

Describe a research study that used human subjects and did not follow the ethical tenets you learned about last week. The study should be in based in the marketing or business disciplines. Explain why it was improper and what changes would need to..

  The day the machines went off

Identify and justify any incidents from history that tell us what we might expect if an electromagnetic pulse actually caused the shutdown of all electronic equipment and financial activity to grind to a halt.

  Therapist believes so strongly in her approach

A therapist believes so strongly in her approach that she finds improvement even when none exists. Which design would prevent this problem?

  Explain the difference between hygiene and motivating factor

Explain the difference between hygiene and motivating factors Explain how a manager can use the Herzberg's two factor theory of motivation to motivate its employees

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd