Discuss the core security mechanisms

Assignment Help Computer Engineering
Reference no: EM131248820

Section 1:

An attacker seeks to view the contents of a specific Microsoft Word document file to whichthey do not have any kind of access.
You may assume that:
- no exploitable vulnerabilities of any kind exist;
- the attacker has a non-privileged account on the system;
- basic system access controls do not currently permit the attacker to access the file andthe attacker cannot directly change these controls; and
- the attacker cannot physically tamper with the system in any way.

Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal.

In completing this task, you must use an approach based on the architectural divisionsdiscussed during lectures to organise your answer. You may find that the informationdiscussed in lectures and contained in the textbook substantially assist you to frame youranswer. However, you may wish to do some additional research. You should include acomplete reference list of any additional sources that you have used.

Component Percentage

Subject credentials management/assignment discussion
Operation of access control mechanisms
Low level security mechanisms
Clarity and quality of writing, including organisation and evidence of research where necessary.

word count - 1600

Section 2:

Now assume that the attacker has been able to gain control over the system such that they have gained administrator access.

Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure. Outline an alternative security architecture that could continue to achieve thespecified security goal notwithstanding this new scenario. You should include in yourdiscussion of the security limitations of your approach.

Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist, so you are expected to think creatively about this solution.

Component Percentage
Discussion of failure of existing architectures
Description of security architecture
Discussion of limitations
Clarity and quality of writing, including organisation and evidence of research where necessary.

Reference no: EM131248820

Questions Cloud

Analyze proper physical access control safeguards : Suggest three (3) logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method. Analyze the means in which data moves within the organization and identify techniq..
Calculate the mean and variance of all activities : Assume the McWaffl e project above contained some uncertain activity times as shown below. Calculate the mean and variance of all activities, and determine the probability of completing the project within 20 days without crashing any activities.
Find bobs key for example and compute the number : Factor:- -Find Bob's key for example and compute the number he would give to Alice if she changed her offer to $1,200.
What are your reasons for buying a franchise : What are your reasons for buying a franchise? Are you interested in retail sales or performing a service? Most franchises are for at least ten years. Are you in this for the long term?
Discuss the core security mechanisms : Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal - Discuss briefly how the above outlined security mechanisms would fail, and the reasons forthis failure
What new technologies being developed in computer industry : Where do you see Business Intelligence and related technology 5 or 10 years from? What new technologies are being developed in the computer industry and how can those technologies be utilized for business and process analysis?
Review three videos of teachers teaching fractions : Visit the Teaching Channel website and review three videos of teachers teaching fractions. Write a 250-500 word review of what you observed and support your review with references to the assigned readings.
Draw the project network showing the activities : Draw the project network showing the activities with their expected times.
How is a nsaid different than acetaminophen : How is a NSAID different than Acetaminophen? What symptoms would each of these, acetaminophen, naproxen, aspirin, and ibuprofen, best treat?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd