SlideShare a Scribd company logo
1 of 5
3 to 4 line answers only each.
No Plagarism.
$25
Need by 10/9/2016 - 10:00 AM
1.
Distinguish between vulnerability, threat, and control.
2.
Theft usually results in some kind of harm. For example, if
someone steals
your car, you may suffer financial loss, inconvenience (by
losing your mode of
transportation), and emotional upset (because of invasion of
your personal
property and space). List three kinds of harm a company might
experience from
theft of computer equipment.
3.
List at least three kinds of harm a company could experience
from electronic
espionage or unauthorized viewing of confidential company
materials.
4.
List at least three kinds of damage a company could suffer when
the integrity
of a program or company data is compromised.
5.
List at least three kinds of harm a company could encounter
from loss of
service, that is, failure of availability. List the product or
capability to which
access is lost, and explain how this loss hurts the company.
6.
Describe each of the following four kinds of access control
mechanisms in
terms of (a) ease of determining authorized access during
execution, (b) ease of
adding access for a new subject, (c) ease of deleting access by a
subject, and (d)
ease of creating a new object to which all subjects by default
have access.
• per-subject access control list (that is, one list for each subject
tells
all the objects to which that subject has access)
• per-object access control list (that is, one list for each object
tells all
the subjects who have access to that object)
• access control matrix
• capability
7.
Suppose a per-subject access control list is used. Deleting an
object in such a
system is inconvenient because all changes must be made to the
control lists of
all subjects who did have access to the object. Suggest an
alternative, less costly
means of handling deletion.
8.
File access control relates largely to the secrecy dimension of
security. What
is the relationship between an access control matrix and the
integrity of the
objects to which access is being controlled?
9.
One feature of a capability-based protection system is the
ability of one
process to transfer a copy of a capability to another process.
Describe a situation
in which one process should be able to transfer a capability to
another.
10.
Suggest an efficient scheme for maintaining a per-user
protection scheme.
That is, the system maintains one directory per user, and that
directory lists all
the objects to which the user is allowed access. Your design
should address the
needs of a system with 1000 users, of whom no more than 20
are active at any
time. Each user has an average of 200 permitted objects; there
are 50,000 total
objects in the system.
11.
Give an example of the use of physical separation for security
in a computing
environment.
12.
Give an example of the use of temporal separation for security
in a computing
environment.
13.
Give an example of an object whose sensitivity may change
during execution.
14.
Respond to the allegation “An operating system requires no
protection for its
executable code (in memory) because that code is a duplicate of
code
maintained on disk.”
15.
Explain how a fence register is used for relocating a user’s
program.
16.
Can any number of concurrent processes be protected from one
another by
just one pair of base/bounds registers?
17.
The discussion of base/bounds registers implies that program
code is execute only
and that data areas are read-write-only. Is this ever not the
case? Explain
your answer.
18.
A design using tag bits presupposes that adjacent memory
locations hold
dissimilar things: a line of code, a piece of data, a line of code,
two pieces of
data, and so forth. Most programs do not look like that. How
can tag bits be
appropriate in a situation in which programs have the more
conventional
arrangement of code and data?
19.
What are some other modes of access that users might want to
apply to code
or data, in addition to the common read, write, and execute
permission?
20.
If two users share access to a segment, they must do so by the
same name. Must
their protection rights to it be the same? Why or why not?

More Related Content

Similar to 3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
kkkseld
 

Similar to 3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx (20)

Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Download
DownloadDownload
Download
 
Distributed Systems in Data Engineering
Distributed Systems in Data EngineeringDistributed Systems in Data Engineering
Distributed Systems in Data Engineering
 
Ijcatr04061002
Ijcatr04061002Ijcatr04061002
Ijcatr04061002
 
Is4560
Is4560Is4560
Is4560
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
CIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comCIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.com
 
CIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.comCIS 349 Education Organization / snaptutorial.com
CIS 349 Education Organization / snaptutorial.com
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDSON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog doc
Fog doc Fog doc
Fog doc
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Presentation, Firewalls
Presentation, FirewallsPresentation, Firewalls
Presentation, Firewalls
 
CIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.comCIS 349 RANK Lessons in Excellence--cis349rank.com
CIS 349 RANK Lessons in Excellence--cis349rank.com
 
CIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.comCIS 349 RANK Inspiring Innovation--cis349rank.com
CIS 349 RANK Inspiring Innovation--cis349rank.com
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 
CIS 349 Effective Communication/tutorialrank.com
 CIS 349 Effective Communication/tutorialrank.com CIS 349 Effective Communication/tutorialrank.com
CIS 349 Effective Communication/tutorialrank.com
 

More from LyndonPelletier761

300 words Building healthier cities and communities involves local.docx
300 words Building healthier cities and communities involves local.docx300 words Building healthier cities and communities involves local.docx
300 words Building healthier cities and communities involves local.docx
LyndonPelletier761
 
3. Describe one of the five major themes of Progressive Reform outli.docx
3. Describe one of the five major themes of Progressive Reform outli.docx3. Describe one of the five major themes of Progressive Reform outli.docx
3. Describe one of the five major themes of Progressive Reform outli.docx
LyndonPelletier761
 
300 words long addressing the following issues.its a discussion h.docx
300 words long addressing the following issues.its a discussion h.docx300 words long addressing the following issues.its a discussion h.docx
300 words long addressing the following issues.its a discussion h.docx
LyndonPelletier761
 
3-5 pagesThe patrol division of a police department is the l.docx
3-5 pagesThe patrol division of a police department is the l.docx3-5 pagesThe patrol division of a police department is the l.docx
3-5 pagesThe patrol division of a police department is the l.docx
LyndonPelletier761
 
3-5 pagesOfficer Landonio is now in the drug task force. H.docx
3-5 pagesOfficer Landonio is now in the drug task force. H.docx3-5 pagesOfficer Landonio is now in the drug task force. H.docx
3-5 pagesOfficer Landonio is now in the drug task force. H.docx
LyndonPelletier761
 
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
LyndonPelletier761
 

More from LyndonPelletier761 (20)

300 words Building healthier cities and communities involves local.docx
300 words Building healthier cities and communities involves local.docx300 words Building healthier cities and communities involves local.docx
300 words Building healthier cities and communities involves local.docx
 
300 words APA format, Select a current example of a policy issue t.docx
300 words APA format, Select a current example of a policy issue t.docx300 words APA format, Select a current example of a policy issue t.docx
300 words APA format, Select a current example of a policy issue t.docx
 
300-400 wordsClick here to access American Rhetorics Top 100 .docx
300-400 wordsClick here to access American Rhetorics Top 100 .docx300-400 wordsClick here to access American Rhetorics Top 100 .docx
300-400 wordsClick here to access American Rhetorics Top 100 .docx
 
3. Describe one of the five major themes of Progressive Reform outli.docx
3. Describe one of the five major themes of Progressive Reform outli.docx3. Describe one of the five major themes of Progressive Reform outli.docx
3. Describe one of the five major themes of Progressive Reform outli.docx
 
3. How do culture and business of Ireland compare with US culture an.docx
3. How do culture and business of Ireland compare with US culture an.docx3. How do culture and business of Ireland compare with US culture an.docx
3. How do culture and business of Ireland compare with US culture an.docx
 
3-page paper which you use the article from the below websites.docx
3-page paper which you use the article from the below websites.docx3-page paper which you use the article from the below websites.docx
3-page paper which you use the article from the below websites.docx
 
3-page APA format reaction paper to the first four stages of develop.docx
3-page APA format reaction paper to the first four stages of develop.docx3-page APA format reaction paper to the first four stages of develop.docx
3-page APA format reaction paper to the first four stages of develop.docx
 
350 words. Standard essay format- no sources needed1. Explain wh.docx
350 words. Standard essay format- no sources needed1. Explain wh.docx350 words. Standard essay format- no sources needed1. Explain wh.docx
350 words. Standard essay format- no sources needed1. Explain wh.docx
 
300 - 500 words in APA format (in text citations) and refernce page..docx
300 - 500 words in APA format (in text citations) and refernce page..docx300 - 500 words in APA format (in text citations) and refernce page..docx
300 - 500 words in APA format (in text citations) and refernce page..docx
 
300 words long addressing the following issues.its a discussion h.docx
300 words long addressing the following issues.its a discussion h.docx300 words long addressing the following issues.its a discussion h.docx
300 words long addressing the following issues.its a discussion h.docx
 
3. Creativity and AdvertisingFind two advertisements in a magazi.docx
3. Creativity and AdvertisingFind two advertisements in a magazi.docx3. Creativity and AdvertisingFind two advertisements in a magazi.docx
3. Creativity and AdvertisingFind two advertisements in a magazi.docx
 
3-page APA format reaction paper to the standards of thinking and th.docx
3-page APA format reaction paper to the standards of thinking and th.docx3-page APA format reaction paper to the standards of thinking and th.docx
3-page APA format reaction paper to the standards of thinking and th.docx
 
3-5 pagesThe patrol division of a police department is the l.docx
3-5 pagesThe patrol division of a police department is the l.docx3-5 pagesThe patrol division of a police department is the l.docx
3-5 pagesThe patrol division of a police department is the l.docx
 
3-5 pagesOfficer Landonio is now in the drug task force. H.docx
3-5 pagesOfficer Landonio is now in the drug task force. H.docx3-5 pagesOfficer Landonio is now in the drug task force. H.docx
3-5 pagesOfficer Landonio is now in the drug task force. H.docx
 
3-4 paragraphsAssignment DetailsContemporary criminal just.docx
3-4 paragraphsAssignment DetailsContemporary criminal just.docx3-4 paragraphsAssignment DetailsContemporary criminal just.docx
3-4 paragraphsAssignment DetailsContemporary criminal just.docx
 
3-4 paragraphsYou have received a complaint that someone in the .docx
3-4 paragraphsYou have received a complaint that someone in the .docx3-4 paragraphsYou have received a complaint that someone in the .docx
3-4 paragraphsYou have received a complaint that someone in the .docx
 
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
3-4 pagesAPA STYLEThe U.S. has long been seen by many around t.docx
 
3-5 pagesCommunity-oriented policing (COP) does involve th.docx
3-5 pagesCommunity-oriented policing (COP) does involve th.docx3-5 pagesCommunity-oriented policing (COP) does involve th.docx
3-5 pagesCommunity-oriented policing (COP) does involve th.docx
 
3 page paper, double spaced, apa formatThis paper is technically.docx
3 page paper, double spaced, apa formatThis paper is technically.docx3 page paper, double spaced, apa formatThis paper is technically.docx
3 page paper, double spaced, apa formatThis paper is technically.docx
 
3 pages You could write a Literacy Narrative” about the influence.docx
3 pages You could write a Literacy Narrative” about the influence.docx3 pages You could write a Literacy Narrative” about the influence.docx
3 pages You could write a Literacy Narrative” about the influence.docx
 

Recently uploaded

Recently uploaded (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

3 to 4 line answers only each.No Plagarism.$25Need by 109201.docx

  • 1. 3 to 4 line answers only each. No Plagarism. $25 Need by 10/9/2016 - 10:00 AM 1. Distinguish between vulnerability, threat, and control. 2. Theft usually results in some kind of harm. For example, if someone steals your car, you may suffer financial loss, inconvenience (by losing your mode of transportation), and emotional upset (because of invasion of your personal property and space). List three kinds of harm a company might experience from theft of computer equipment. 3. List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials. 4. List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised. 5. List at least three kinds of harm a company could encounter from loss of service, that is, failure of availability. List the product or capability to which
  • 2. access is lost, and explain how this loss hurts the company. 6. Describe each of the following four kinds of access control mechanisms in terms of (a) ease of determining authorized access during execution, (b) ease of adding access for a new subject, (c) ease of deleting access by a subject, and (d) ease of creating a new object to which all subjects by default have access. • per-subject access control list (that is, one list for each subject tells all the objects to which that subject has access) • per-object access control list (that is, one list for each object tells all the subjects who have access to that object) • access control matrix • capability 7. Suppose a per-subject access control list is used. Deleting an object in such a system is inconvenient because all changes must be made to the control lists of all subjects who did have access to the object. Suggest an alternative, less costly means of handling deletion. 8. File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?
  • 3. 9. One feature of a capability-based protection system is the ability of one process to transfer a copy of a capability to another process. Describe a situation in which one process should be able to transfer a capability to another. 10. Suggest an efficient scheme for maintaining a per-user protection scheme. That is, the system maintains one directory per user, and that directory lists all the objects to which the user is allowed access. Your design should address the needs of a system with 1000 users, of whom no more than 20 are active at any time. Each user has an average of 200 permitted objects; there are 50,000 total objects in the system. 11. Give an example of the use of physical separation for security in a computing environment. 12. Give an example of the use of temporal separation for security in a computing environment. 13. Give an example of an object whose sensitivity may change during execution. 14.
  • 4. Respond to the allegation “An operating system requires no protection for its executable code (in memory) because that code is a duplicate of code maintained on disk.” 15. Explain how a fence register is used for relocating a user’s program. 16. Can any number of concurrent processes be protected from one another by just one pair of base/bounds registers? 17. The discussion of base/bounds registers implies that program code is execute only and that data areas are read-write-only. Is this ever not the case? Explain your answer. 18. A design using tag bits presupposes that adjacent memory locations hold dissimilar things: a line of code, a piece of data, a line of code, two pieces of data, and so forth. Most programs do not look like that. How can tag bits be appropriate in a situation in which programs have the more conventional arrangement of code and data? 19. What are some other modes of access that users might want to apply to code
  • 5. or data, in addition to the common read, write, and execute permission? 20. If two users share access to a segment, they must do so by the same name. Must their protection rights to it be the same? Why or why not?