Worth 2 Points. Each Problem Essay

PAGES
8
WORDS
2366
Cite

It also contains printable characters. Problem 3.6

95*95*95*95*95*95*95*95*95*95 + 6.4 million

=95^10/6.4 million

Chapter 4

Question 4.1

DAC is used to define the basic access control policies to various objects. These are set according to the needs of the object owners. The MAC are access control policies that are system-controlled. The system in this case dictates as well as controls the acess levels to various objects.

Question 4.2

RBAC is a completely separate as well as distinct model from DAC and MAC. There are however several relationships between them. As an example, RBAC can effectively simulate DAC and MAC. MAC can also be employed in the implementation of RBAC whenever the role hierarchy is in the form of a tree as oppose to being a partial order.

Question 4.5

Access right are authorization levels that are set for files, folders, partitions and hard drives in order to dictate the level of access, data manipulation as well as general uses of the computing resources.

Problem 4.3

a.

The advantages of using four modes instead of two are;

The ability to implement a fine-grained security policy

The ability to provide a distinction within system kernel code.

Disadvantages

Uses too much system resources (Memory in particular)

b.

Yes. A case with more than four modes is achievable. Examples are User-mode debugging, Target application execution, Sleep mode and Kernel-mode debugging.

VAX, x86 can support four modes. The earlier archs (Multics) supported even more modes

Chapter 5.5

The concept of cascading authorization is a security access control technique that works whenever two or more subjects are given the permission of granting as well as revoking some aspects of the access rules to other system subjects. The outcome is the creation of a cascade revocation chain.

Question 5.6

An inference threat is recorded of a given user can effectively deduce sensitive data/information from the otherwise non-sensitive data. It can lead to the exposure of confidential information as well as loss of data and its integrity.

Problem 5.5

In order to effectively determine which value of X's successful grants of EMPLOYEE must subjected to revocation, we must form a list of all remaining grants of X's.

USERID

TABLE

READ

DELETE

X

EMPLOYEE

(15,30)

(15)

(30)

The list of X's grant to others must also be drawn

USERID

TABLE

...

The X's grants if INSERT and READ are however allowed to remain since they are at that moment 'supported' by the incoming grants that occurred at an earlier time.
Chapter 6

6.3. Describe the difference between host-based IDS and network-based IDS

A host-based IDS is installed on a given machine and then performs its duties of monitoring the abnormalities in the oncoming traffic. A network IDS on the other hand resides on a span port of a switch from where it monitors all of the information that emanates from the firewall in to the internal network. A larger network may have several strategically positioned sensors.

6.4. What are the three benefits that can be provided by an IDS

1. Should an intrusion be promptly detected, the intruder can effectively be identified as then ejected from the system in good time before any damage is done to thedata or the system. The system is important since it can help prevent further damage should the intrusion be detected early

2. An effective IDS can act as an effective deterrent in the prevention of intrusions

3. Intrusion detection allows for the collection of information on various intrusion techniques. The information can then be used in strengthening of the IDS.

6.5

• Ever running

• Tolerant to fault

• Resist to Subversions (Attacks on the IDS)

• Very little overhead

• Highly scalable

• Degradation of the IDS service should never affect the rest of the network.

• Has dynamic configuration to adjust its settings according to the intrusion condition

6.6

Depending on the specific network conditions and the environment, network-based IDS may have advantages as well as disadvantages. The disadvantages may include a higher learning curve in the installation, editing as well as maintenance of the software. One must be familiar with the command line interface of some of the software. The creation of the policy as well as editing of the policy posses another challenge. The advantages include;

Running of software like Tripwire on a platform which is Unix-based can be very daunting for a person who is not familiar with the system. The intruder Alert has both negative ands positive aspects. One advantage is that it is designed to easily integrate with other systems such as NetProwler, an network-based IDS

Cite this Document:

"Worth 2 Points Each Problem" (2011, September 23) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/worth-2-points-each-problem-45685

"Worth 2 Points Each Problem" 23 September 2011. Web.19 April. 2024. <
https://www.paperdue.com/essay/worth-2-points-each-problem-45685>

"Worth 2 Points Each Problem", 23 September 2011, Accessed.19 April. 2024,
https://www.paperdue.com/essay/worth-2-points-each-problem-45685

Related Documents

Progress Due Week 9 worth 200 points Note: The assignments a series papers-based case, located Student Center shell. The assignments dependent . During project life cycle, project risk reviews reports required previously identified risk Impact of events on the project The top two threats that had been identified as destruction of company reputation and loss of customers have occurred. These threats had been established as having a high impact on the

(Broderick & Blewitt). Aside from the major issue, at least for the parents, of Jason's reserved social demeanor; there have been several other indicators of acting our behavior that he has presented. On several occasions Jason has complained of stomachaches and headaches prior to having to go to day care or even to any other playtimes where he knows his parents will not be attending. Also, if he has felt

While the same-sex parent is important in a child's life, the opposite-sex parent is also tremendously important. For the 90% of the population that are heterosexual, the opposite sex parent is the person who teaches them how to have romantic relationships. There is a reason that little girls love their daddies and that little boys are mama's boys, which has nothing to do with incest or actual sexual behavior. Instead,

Problem Solving Systems Thinking, Technology, and Organizational Change Models of Problem Solving Different Approaches to Problem Solving Brainstorming Risk Assessment Flow Charts Mind Mapping Identification of Complex Problem Analyzing the Problem Identification of a Range of Potential Solutions Constraints Evaluation of Potential Solutions Phase IV Evaluating Progress Implementation Process Risk Assessment Accelerating Change Formative and Summative Evaluation Values and Ethical Issues Values Corporate Responsibility and Ethics Thinking and Decision Making Strategies Problem Solving Process Complex Problem Solving This section of the paper is focusing on the introduction of complex problem solving, which reflects the

Problem-Solving and Mediation The Problem-Solving and Decision Making Model (PSDM) is viewed as an integral part of the entire process of conflict resolution. Within this approach there is the mentality that if any conflict is approached as a more cooperative endeavor, where both parties are invested in the outcomes, then both parties are more likely to work hard and proactively in order to create a situation or outcome which will

two-day assessment in order to determine who will be the next marketing director. The three candidates were all expected to go through the assessment process that was designed by the human resource professionals together with senior level managers the candidates would be taken through role plays, verbal and mathematical ability tests, an interview and a personality profile in order to determine the candidate who was best suited for the