Assignment This assignment has a maximum page limit (Times New Roman, 12-point, Single Column) for the main body contents, exclusive of tables of contents, indexes, or bibliographies etc. A penalty of...

1 answer below »
Assignment as attached


Assignment This assignment has a maximum page limit (Times New Roman, 12-point, Single Column) for the main body contents, exclusive of tables of contents, indexes, or bibliographies etc. A penalty of 1% of the total possible mark may be applied for every 10 words over this page limit. A failure to comply with any applicable instructions or requirements will result in a 10– 20% penalty at the marker’s discretion. Part I (35%, 3 pages): Windows Security An attacker seeks to view the contents of a specific Microsoft Word document file to which they do not have any kind of access. You may assume that: · no exploitable vulnerabilities of any kind exist; · the attacker has a non-privileged account on the system; · basic system access controls do not currently permit the attacker to access the file and the attacker cannot directly change these controls; and · the attacker cannot physically tamper with the system in any way. Outline and describe the core security mechanisms that Windows implements to prevent the attacker achieving that goal. Include a brief discussion of the low-level mechanisms that protect the operating system from an attack that targets the layer below. The marks breakdown table below may assist you in identifying the general issues that need to be covered. In completing this task, you must use an approach based on the architectural divisions discussed during lectures to organise your answer. You may find that the information discussed in lectures and contained in the textbook substantially assist you to frame your answer. However, you may wish to do some additional research. You should include a complete reference list of any additional sources that you have used. Component Percentage Discussion of how subject credentials are managed and assigned to processes. You may wish to consider the following points. · The different ways that user credentials are handled between, for example, a single autonomous system and one part of an enterprise network. · The low-level system components involved in verifying the user’s identity and then ensuring that the user’s processes have the correct identity if the user is granted access to the system. 10% Operation of relevant access control mechanisms. Describe these in the context of the information given to you in the question. 10% Low level security mechanisms that underpin access control. For example, how does the operating system prevent processes from manipulating the kernel when invoking system calls and accessing privileged memory etc. 10% Clarity and quality of writing, including organisation and evidence of research where necessary. 5%
Answered 1 days AfterSep 29, 2021

Answer To: Assignment This assignment has a maximum page limit (Times New Roman, 12-point, Single Column) for...

Deepti answered on Sep 30 2021
130 Votes
System Components & Credential Management
Windows uses User Access Control as fundamental component to ensure security. When UAC is enabled, Windows prompts for consent or prompt
s for credentials of valid local administrator account before beginning a task and ensures that no malicious software affects the system. In the given case, prompt for consent is required. The user in question attempts to perform the task of accessing the word document that requires special permission. Consent prompt is presented when user attempts to perform such a task that requires user’s administrative token. For immediate identification of security risk, UAC elevation prompts are color coded.
Access Control Mechanisms
The mechanisms of Discretionary (DAC), Role-Based and Mandatory Access Control (MAC) operate to secure the word document from the intruder. DAC restricts the file from access based on the identity of the attacker. The document owner establishes permission and determines which users can access with which privileges. This model uses access control lists and capability tables which contain subject and object. These tables are checked by Windows OS security kernel to determine whether access should be allowed. Security kernel ensures that unauthorized changes are refuted. Role-based access control operates in large enterprise with different departments and allows access to file through defined roles attributing characteristics, applied to permissions and actions. System administrators use it to assign organizational roles and exercise the principle of least privilege. This shall allow an authorized user to access only what is needed to accomplish their job. Windows OS uses this control mechanism by creating groups. Each group has its own file permissions and each...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here