Question

(3) Why is it that the Protection Matrix is almost never implemented directly in practice? How a. does using ACLs or capabili

0 0
Add a comment Improve this question Transcribed image text
Answer #1

a.(3)

Security policies in the context of requirements for information security and the circumstances in which those requirements

must be met, examines common principles of management control, and reviews typical system vulnerabilities, in order to

motivate consideration of the specific sorts of security mechanisms that can be built into computer systems—to

complement nontechnical management controls and thus implement policy—and to stress the significance of establishing

GSSP. Additional information on privacy issues and detailing the results of an informal survey of commercial security officers

is provided in the two chapter appendixes

Organizations and people that use computers can describe their needs for information security and trust in systems in terms

of three major requirements:

Confidentiality: controlling who gets to read information;

Integrity: assuring that information and programs are changed only in a specified and authorized manner; and

Availability: assuring that authorized users have continued access to information and resources.

These three requirements may be emphasized differently in various applications. For a national defense system, the

chief concern may be ensuring the confidentiality of classified information, whereas a funds transfer system may

require strong integrity controls. The requirements for applications that are connected to external systems will differ

from those for applications without such interconnection. Thus the specific requirements and controls for information

security can vary.

Some organizations formalize the procedure for managing computer-associated risk by using a control matrix that

identifies appropriate control measures for given vulnerabilities over a range of risks. Using such a matrix as a guide, administrators may better select appropriate controls for various resources. A rough cut at addressing the problem is

often taken: How much business depends on the system? What is the worst credible kind of failure

However, for many of the management controls discussed above,

there is not a clear, widely accepted articulation of how computer systems should be designed to support these controls,

what sort of robustness is required in the mechanisms, and so on. As a result, customers for computer security are faced with a "take-it-or-leave-it" marketplace. For instance, customers appear to demand password-based authentication because

it is available, not because analysis has shown that this relatively weak mechanism provides enough protection. This effect

works in both directions: a service is not demanded if it is not available, but once it becomes available somewhere, it soon

becomes wanted everywhere.

Access Control List (ACL)

1. An access control list (ACL) is a table that tells a computer operating system which access rights each user has to a

particular system object, such as a file directory or individual file.

2. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with

access privileges.

3. The most common privileges include the ability to read a file (or all the files in a directory), to write to the file or files, and to

execute the file (if it is an executable file, or program).

4. Microsoft Windows NT/2000, Novell's NetWare, Digital's OpenVMS, and UNIX-based systems are among the operating

systems that use access control lists.

Capability List:

1. A capability is a token, ticket, or key that gives the possessor permission to access an entity or object in a computer

system.

2. A capability can be thought of as a pair (x, r) where x is the name of an object and r is a set of privileges or rights. With

each subject we can store that subject's capabilities. And, the subject presents to the guard a capability in order to get access

to an object.

3. Note that a capability is completely transferable; it doesn't matter who presents the capability. This framework completely

eliminates the need for authentication.

4. However, with ACLs we were assuming that authentication was unforgettable. With capabilities, we now need a way to

make capabilities unforgettable. The success of a capability-based mechanism depends on it.

b. (2)

A capability is a token, ticket, or key that gives the possessor permission to access an entity or object in a computer

system.

A capability can be thought of as a pair (x, r) where x is the name of an object and r is a set of privileges or rights. With

each subject we can store that subject's capabilities. And, the subject presents to the guard a capability in order to get access

to an object.

Each object has a security attribute that identifies its access control list. The list has an entry for each system user with

access privileges.

Note that a capability is completely transferable; it doesn't matter who presents the capability. This framework completely

eliminates the need for authentication.

However, with ACLs we were assuming that authentication was unforgettable. With capabilities, we now need a way to

make capabilities unforgettable. The success of a capability-based mechanism depends on it.

c. (2)

Capabilities are distributed throughout the system - must be found and destroyed - difficult

1. Expiry Time : capabilities expire after a time and new must be requested  

2. Back pointers : objects maintain pointers to all capabilities issued - costly to implement, particularly if capabilities are

passed around as parameter.

3. Indirect Capabilities : capability points to table entry which points to object

4. Keys : capability contains encrypted key checked by object

d. (3)

How does a computer virus attack?

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause

the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected

program, which in turn causes the virus code to be executed.

This means that a virus can remain dormant on your computer, without showing major signs or symptoms. However, once

the virus infects your computer, the virus can infect other computers on the same network. Stealing passwords or data,

logging keystrokes, corrupting files, spamming your email contacts, and even taking over your machine are just some of

the devastating and irritating things a virus can do.

While some viruses can be playful in intent and effect, others can have profound and damaging effects. This includes

erasing data or causing permanent damage to your hard disk. Worse yet, some viruses are designed with financial gains

in mind.

Add a comment
Know the answer?
Add Answer to:
(3) Why is it that the Protection Matrix is almost never implemented directly in practice? How a....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The activity An EHR was implemented at the General Hospital one year ago, before you were...

    The activity An EHR was implemented at the General Hospital one year ago, before you were hired. The implementation process did not go smoothly and now there are strong EHR advocates and strong EHR-dissenters on the team. The CEO wants to move forward with an implementation of the bar-coded medication administration feature of the EHR, but the director of nursing does not. You have been asked to manage the implementation and see that it is successful. You will first need...

  • After reading the article, answer the questions that follow. Turning Off, Dining In Last night at...

    After reading the article, answer the questions that follow. Turning Off, Dining In Last night at dinner, I suddenly realized that no one around our table had said anything for quite a while. I looked at my son, who had headphones on and whose face was aglow with the white-blue light of this phone on which he was watching a YouTube video. My daughter was also bathed in this same glow, but a tap-tap-tap was coming from her phone as...

  • Congn UlIHISsion 074 Cong'c es that arise in research on research to provide guidance on the...

    Congn UlIHISsion 074 Cong'c es that arise in research on research to provide guidance on the ethical on human subjects. The result of the commission's work is this report, hics and elucidates which lays out a general approach to thinking about research tes the three most relevant moral principles-respect for three beneficence, and justice. chical Principles and Guidelines for Res h Involving Human Subjects partly because both often occur together (as in re- search designed to evaluate a therapy) and...

  • Will facebook be able to have a successful business model without invading privacy? explain your answer?...

    Will facebook be able to have a successful business model without invading privacy? explain your answer? could facebook take any measures to make this possible? BUSINESS PROBLEM-SOLVING CASE Facebook Privacy: Your Life for Sale Facebook has quickly morphed from a small, niche haps most obviously. Facebook allows you to keep in networking site for mostly Ivy League college stu- touch with your friends, relatives, local restaurants, dents into a publicly traded company with a market and, in short, just about...

  • Case 2: Going to The X-Stream Gil Reihana is the chief executive officer of X-Stream, an...

    Case 2: Going to The X-Stream Gil Reihana is the chief executive officer of X-Stream, an Auckland-based company that assembles personal computers for the New Zealand and Australian markets, and sells them through a number of chain stores and independent retailers. He started the company six years ago, at the age of 25, after graduating from university with a Bachelor’s degree in Information Technology and Management. To establish the company, Reihana invested $300 000 he had inherited and persuaded various...

  • Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are...

    Learn to apply your ethical values using the Giving Voice to Value (GVV) method. There are multiple GVV documents in this Module. Review them all. You may do the exercises suggested in the documents but you do not have to post them in Canvas. You will learn how to factor your personal values into your ethical decisions from the method, you will still use the IDEA case analysis method when analyzing the GVV case, The Client Who Fell Through The...

  • Why did the Energy Telematics project fail and why was Joel's tram vaught off guard by...

    Why did the Energy Telematics project fail and why was Joel's tram vaught off guard by the hostile reaction of the truck drivers at the Omaha depot? MINI CASE Working Smarter at Continental Furniture International Joel Parsons hurried down the hall to the monthly executive committee meeting doing a mental checklist of all the things he was responsible for: sales analysis-check; mar keting stats-check; quarterly and YTD financials-check; operating statistics-check trends in each of these areas-check. Parsons was right hand...

  • Putting Your Best Cyberface Forward By STEPHANIE ROSENBLOOMJAN. 3, 2008 your nails? Have you pierced your...

    Putting Your Best Cyberface Forward By STEPHANIE ROSENBLOOMJAN. 3, 2008 your nails? Have you pierced your tongue? Is your tote bag emblazoned with the words "I'm not a plastic bag"? at the way they do for reasons too numerous to fit into any therapist's notebook. Yet we commonly shape People look and act the way they do for reasons too ir behavior or tweak our appearance in an attempt to control how others perceive us i m mon sense. Social...

  • THE COMPANY: MORE POWER, INC. More Power, Inc., is a large, local retail store specializing in...

    THE COMPANY: MORE POWER, INC. More Power, Inc., is a large, local retail store specializing in the sale and service of hardware, tools, lawn and garden implements, and other materials for the home. More Power operates seven days a week, dawn to dusk. Approximately 120 employees work in distinct divisions within the store, including customer service/return desk; warehouse and delivery; service and repair; and three distinct sections focused on (1) hardware and tools, (2) lawn and garden and outdoors, and...

  • Amazon to Competition: We Will Crush You! Amazon to Employees: We Will Churn You! Globally, Amazon...

    Amazon to Competition: We Will Crush You! Amazon to Employees: We Will Churn You! Globally, Amazon is one of the largest and most successful companies in any industry. Technological innovation has contributed to its success, as has its employee acquisition practices, which are exceptionally high. The question is what has allowed this company to thrive and maintain its success? This activity is important because it shows how companies like Amazon hire based on personality and individual differences. Such companies place...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT