Question

USER ACCOUNT CONTROL (UAC) Microsoft Windows User Account Control (UAC) provides a higher level of security...

USER ACCOUNT CONTROL (UAC)

Microsoft Windows User Account Control (UAC) provides a higher level of security for users. Research UAC using the Internet. What were its design goals? Were they achieved? How secure is UAC? What are its strengths? What are its weaknesses?

Respond with a 100-150 word post

0 0
Add a comment Improve this question Transcribed image text
Answer #1

///design goals

-secures desktop application.

-helps virus or any other and stops other form of application.

-gives user an option to select or reject option.

///achieved or not (not achieved)

It receives both positive and negative feedback. It always irritates the users by asking always allow the program or not. The programs wants to changes and asks user to allow it or not.

// secure

By doing some test no antivirus software installed in the windows. Only one software were installed and it will also installed because of user clicked yes.

///uac strengths

It will give warning of installing any other new application. It will also gives you notifications.

///uac weakness

-incredibly intrusive.(causing disruption with un invited link)

Add a comment
Know the answer?
Add Answer to:
USER ACCOUNT CONTROL (UAC) Microsoft Windows User Account Control (UAC) provides a higher level of security...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Introduction The debate over “responsible” disclosure of software vulnerabilities has been a mainstay in the security...

    Introduction The debate over “responsible” disclosure of software vulnerabilities has been a mainstay in the security space. In 2015, new fuel was added to the fire as Google disclosed a Microsoft Windows vulnerability, along with exploit code, two days before the scheduled patch. (Exploit code is the stretch of code that hackers can exploit to hack software.) And in 2018, the debate came back into the forefront with the infamous Intel Spectre and Meltdown chip problems. The Google-Microsoft conflict highlights...

  • You work for EGS Testing Solutions; your company is involved in testing related to access control...

    You work for EGS Testing Solutions; your company is involved in testing related to access control systems. A large, private fitness club contacted your company because their Web server was hacked. The fitness club has a corporate office with 50 workstations, 4 application servers, 2 e-mail servers, 2 Web servers, and 129 franchisees with 10 workstations and about 3,500 members at each location. Except for the equipment at the franchisees’ locations, all other equipment resides at the central headquarters. The...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • As a project goes through the execution phase, project control is critical to ensure that a...

    As a project goes through the execution phase, project control is critical to ensure that a project stays within the constraints of time, cost, and scope. A project manager will use different monitoring techniques to help keep the project within these constraints. If a project incurs changes, becomes delayed, or costs become higher, a project manager will execute change control to document and determine how to handle the change. Once a project is completed, the project team should complete a...

  • The Challenge VC, Inc. is an entertainment company that specializes in and provides streaming media and video-on-demand...

    The Challenge VC, Inc. is an entertainment company that specializes in and provides streaming media and video-on-demand online. It is headquartered in Manhattan, New York. Their on-line application that allows its customers to access video content is currently running on their data center and comprises of the following tiers: a Microsoft SQL Server Database, a Web Front-End on a Windows Server with IIS, and a File System-based content store for image and video files. In addition, the company uses internally...

  • MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations...

    MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations/Departments within the Caribbean territories, stood poised to meet the needs of its stakeholders by launching an online database, located at www.SSDCI.gov. The database will provide members and the public with access to the full set of services that can (also) be initiated face to face; and it will provide managed, private, secure access to a repository of public and/or personal information. For example, insured persons accumulate...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • 1. Why is growing the number of users such an important metric for social media companies?...

    1. Why is growing the number of users such an important metric for social media companies? How does Metcalfe’s Law relate to the profitability of social media companies? 2. Most social media companies rely on ad revenue as their main source of income. What are other ways that LinkedIn generates income? Why is it important for a company to have multiple ways of generating income? 3.Why do recruiters and job seekers like LinkedIn? Explain why an employer may dislike LinkedIn....

  • Site Management Solutions, Inc. of Columbia Maryland, is a data center design and management consulting firm....

    Site Management Solutions, Inc. of Columbia Maryland, is a data center design and management consulting firm. Site Management Solutions employees sign an initial two-year employment commitment and the most promising employees are given extended job tours overseas. Since overseas experience is highly desirable, giving the employees a chance to command much higher salaries, prior to being posted overseas employees agree to work for a specified additional time upon their return to Maryland. Jeff worked for Site Management Solutions, but then...

  • A test specification provides designers with what needs to be known in order to perform a...

    A test specification provides designers with what needs to be known in order to perform a specific test, and to validate and verify the requirement to be tested. The test script is divided into the test script, which is the generic condition to be tested, and one or more test cases within the test script. Provide a test script and test case for at least 3 of your requirements identified in your requirements specification. Provide the following format for an...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT