Computer Security:
Describe what is meant by "trusted path" in an operating system and give an example of a trusted path required to log into most windows operating systems.
what is trusted path?
trusted path is a component that gives certainty that the client is communicating with what the client proposed to communicate with, guaranteeing that assailants can't catch or adjust whatever data is being imparted.
trusted path in Windows
One of well known procedures for secret key taking in Microsoft Windows was login satirizing, which depended on projects that reproduced working framework's login brief. At the point when clients attempt to sign in, the fake login program can be able to catch client passwords for later use. As a defend Windows NT presented Ctrl-Alt-Del grouping as secure consideration key to get away from any outsider projects and summon framework login brief
Computer Security: Describe what is meant by "trusted path" in an operating system and give an...
Different file systems have different security capability. Describe the most secure Windows file system -
1. Describe what is meant by an excise tax. Give an example. What is meant by the incidence of a tax?
Describe what is meant by an excise tax. Give an example. What is meant by the incidence of a tax? What is the impact of an excise tax on quantity and price? Provide a detailed example. What happens when an excise tax is paid mainly by consumers? Describe what happens when an excise tax is paid mainly by producers? What are the costs of taxation? Provide a detailed discussion. Describe how deadweight loss changes when supply is elastic and inelastic...
Describe desirable features of an ideal desktop operating system. Describe what improvements should be made over current solutions, for example, Windows 10
Working with files on your computer involves a very important set of tasks listed below. In addition, researching or finding information on the Internet is an invaluable tool. 1. Describe what is meant by the term 2. Give an example of how each is used or accomplished by the Operating System on your specific computer Files a. Hierarchical File Systems b. Navigation c. Copying d. Renaming e. Deleting f. Download
Submit a Key Assignment first draft of your operating system security plan, as follows: - In your own words, describe the process and outline the steps to harden the Windows 2008 operating system. - In your own words, describe the process and outline the steps to harden the Red Hat 5 operating system.
Complete the hardening and auditing tasks using a personal computer with the default installation of Windows 7 or Windows 10. Provide screenshots of all screens and queries made. Ensure that you are logged in as an administrator. Using a computer that has Windows 7 or Windows 10 installed: Review the antivirus program. Ensure that it is up to date, is configured for automatic updates, and is scheduled to run quick scans regularly. Note when the last full system scan was...
Computer Security Can we use the legal system (Laws, Regulations, Police forces, etc.) to protect computer systems? Give 3 simple reasons
What are the key features of file management in the UNIX operating system? Discuss the challenges you have faced in attempting to install and configure UNIX. Explain how the designers of the Windows operating system had to incorporate a set of five software design goals; extensibility, portability, reliability, compatibility, and performance. Discuss the role of the I/O Manager. Discuss how Kerberos security provides effective distributed security. What is the difference between device management in the Windows operating systems and MS-DOS?...
Please answer the following questions: 1) Describe the main functions of a computer network (12 marks) 2) In your own words, compare the three types of files: directories, ordinary files, and special files. Explain what would happen if a user modified a directory file (10 marks) 3)What are the advantages of having a Windows system using the menu-driven interface, instead of typing commands. Give at least one example where having menus is an advantage (6 marks) 4) Identify at least...