Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

The book that we use is Computer Security Art and Science by Matt Bishop. Each answer should be from 600- 900 words.

Answer the following questions.

1)(12 pts.) Chapter 18 (pgs. 494-495) -Problem#7

A company develops a new security product using the extreme programming software development methodology. Programmers code, then test, then add more code, then test, and continue this iteration. Every day, they test the code base as a whole. The programmers work in pairs when writing code to ensure that al least two people review the code. The company does not adduce any additional evidence of assurance. How would explain to the management of this company why their software is in fact not "High-assurance" software?

2) (15 pts.) Chapter 22 (pgs. 642-643) -Problem#2

Consider how a system with capabilities as its access control mechanism could deal with Trojan horses.

  1. In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify you answer in light of the theoretical equivalence of ACLs and C-Lists.
  2. Consider now the inheritance properties of new processes. If the creator controls which capabilities the created process is given initially, how could the creator limit the damage that a Trojan horse could do?
  3. Can capabilities protect against all Trojan horses? Either show that they can or describe a Trojan horse process that C-Lists cannot protect against.

3) (18 pts.) Chapter 22 (pgs. 642-643) -Problem#12

Assume that the Clark- Wilson model is implemented on a computer system. Could a computer virus that scrambled constrained data items be introduced into the system? Why or why not? Specifically, if not, identify the precise control that would prevent the virus from being introduced, and explain why it would prevent the virus from being introduced; if yes, identify the specific control or controls that would allow the virus to be introduced and explain why they fail to keep it out.

 

4) (20 pts.) Chapter 23 (pgs. 685-687) -Problem#1

Classify the following vulnerabilities using the RISOS model. Assume that the classification is for the implementation level. Justify your answer.

  1. The presence of the "wiz" command in the sendmail program (see Section 23.2.8)
  2. The failure to handle the IFS shel variable by loadmodule. (see Section 23.2.8).
  3. The failure to select an Administrator password that was difficult to guess. (see Section 23.2.9).
  4. The failure of the Burroughs system to detect offline changes to files (see Section 23.2.6).

5) (15 pts.) Chapter 23 (pgs. 685-687) -Problem#4

A common error on UNIX systems occurs during the configuration of bind, and directory name server. The time-to-expire field is set at 0.5 because the administrator believes that this fields unit is minutes (and wishes to set the time to 30 seconds). However, bind expects the field to be in seconds and reads the value as 0- meaning that no data is ever expired.

  1. Classify this vulnerability using the RISOS model, and justify your answer
  2. Classify this vulnerability using the PA model, and justify your answer.
  3. Classify this vulnerability using Aslam's model, and justify your answer,

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91251575
  • Price:- $80

Priced at Now at $80, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Use the information on the market for bicycles to answer

Use the information on the market for bicycles to answer the following questions. Demand: P = -125*Q + 540; Supply: P = 150*Q + 210, where P is the price of bicycle and Q is the quantity demanded or supplied of bicycle. ...

Suppose the following matrix represents the number of saws

Suppose the following matrix represents the number of saws ordered from your company each month over the last year. saws = [1,4,5,3,7,5,3,10,12,8, 7, 4] All the numbers should be zero or positive. (a) Use an if statement ...

Suppose two packets arrive to two different input ports of

Suppose two packets arrive to two different input ports of a router at exactly the same time. Also suppose there are no other packets anywhere in the router. a. Suppose the two packets are to be forwarded to two differen ...

Question understanding how cloud security differs from

Question: Understanding how cloud security differs from on-premise data center security is crucial for organizational success. What are three (3) key differences between cloud security threats and on-premise security thr ...

An article in the wall street journal noted that an

An article in The Wall Street Journal noted that an" increase in the price of crude oil quickly reduces demand for oil". Do you agree with this statement? Briefly explain.

A good sample of benzoic acid melts at 121-122 degrees

A good sample of benzoic acid melts at 121-122 degrees Celsius. However, a student had a sample that melted over a range, 105-115 degrees Celsius. What did the student conclude about that sample?

Systems analysis project 8 can you answer the 4 questions

Systems analysis project 8: can you answer the 4 questions at the task section please, thank you. Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the ...

For a small computer design with 8-instructions suppose the

For a small computer design with 8-instructions. Suppose the processor is modified such that it can is 21-bit processor and can address 2^16 Memory locations: 1. What is the word size? 2. How that will affect the size of ...

Question define a class named taxreturn that contains a tax

Question : Define a class named TaxReturn that contains a tax ID number, last name, first name, annual income, number of dependents, and amount of tax owed for a taxpayer. Include constant static fields that

Argue why wireshark should be outlawed and it is a clear

Argue why Wireshark should be outlawed and it is a clear violation of privacy act and then argue why it should not be out outlawed and that it is a vital resource to be freely used and does not violate the privacy act

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As