Reference no: EM132574693
ICT379 Security Architectures - Murdoch University
Part I
An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access.
You may assume that:
• no exploitable vulnerabilities of any kind exist;
• the attacker has a non-privileged account on the system;
• basic system access controls do not currently permit the attacker to access the file and the attacker cannot directly change these controls; and
• the attacker cannot physically tamper with the system in any way.
Outline and describe the core security mechanisms that Windows implements to prevent the attacker achieving that goal. Include a brief discussion of the low-level mechanisms that protect the operating system from an attack that targets the layer below. The marks breakdown table below may assist you in identifying the general issues that need to be covered.
In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer. You may find that the information discussed in lectures and contained in the textbook substantially assist you to frame your answer. However, you may wish to do some additional research.
Part II
Assume that you are given a task to design a system for a vehicular network (or any cloud-based storage system). Briefly discuss security requirements for such a system. Outline a security architecture that could achieve the specified security goals in the scenario. You must include in your discussion of the security limitations of your approach.
Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist as a specific product or system, so you are expected to think creatively about this solution. It is likely that you will need to undertake some research to assist in answering this part of the problem.
Expectations
• Students are expected to demonstrate a significant level of engagement with the topic as appropriate for someone in the final year of a degree. Superficial answers or irrelevant material will not be awarded any marks.
• This assignment is deliberately designed to require you to think about what
information to include and how best to present it.
• The page limit is intended to make you stop and think about every word that you put in and how it can earn you marks: use each word wisely. Assignments that simplyfill the page limit with vague or irrelevant statements or unnecessary tables of contents etc. will almost certainly fail.
• Employers of IT graduates consistently rate communication skills as the most
important attribute they look for when hiring. Your ability to explain technical concepts clearly and concisely is central to your employability and career prospects.
Attachment:- Security Architectures.rar
What are the advantages of using social media
: Patients are using social media sites now more than ever. Hospitals are using social media channels to answer patient questions and provide immediate customer.
|
What rigsby would recognize realized gross profit of
: What Rigsby would recognize realized gross profit of? On December 15, 2021, Rigsby Sales Co. sold a tract of land that cost $3,200,000
|
Compute earnings per share
: On December 31, its stock was trading at $6.21 per share. Compute: d. earnings per share and e. the price earnings ratio
|
What is the total stand-alone selling price
: What is the total stand-alone selling price that Orange would use for the extended warranty discount option for purposes of allocating revenue
|
Discussion of the low-level mechanism
: Discussion of the low-level mechanisms that protect the operating system from an attack that targets the layer
|
What will you take from given year and apply to the future
: For the Lecture Final I want to know how 2020 has changed you. What have you learned about health care, socioeconomic status, poverty, food insecurity.
|
Prepare a schedule of budgeted cash receipts for april
: The April 1 balance in accounts receivable is $14,000. "Prepare a schedule of budgeted cash receipts for April, May, and June
|
Find reliable would report installment receivables
: In its 2021 year-end balance sheet, Reliable would report installment receivables (net) of? Reliable Enterprises sells distressed merchandise on extended credit
|
Describe your plans for putting your education to use
: Demonstrate with at least two examples how your newly acquired knowledge and skills have shaped both your personal and professional development.
|