Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

DQ_Week 2

This is a preview of the 4-page document
Read full text

Different cryptography, ecryption decryption, ivolvement of special characters, mxture of small and capital characters along with numbers, slf generation algorithm as done by William H. Hubert (2002) etc. o the second way could be to generate a rule based system to create the surreptitious set of rules and regulations, cntrol the rules that would be associated to the users and subsequently, te actual login interface for the said system. Te above design will not allow users to select an easy password like MS Outlook’s Password Management Protocol. A is based on an interaction with the user’s secret questions and an involvement of randomness makes it harder for intruders to guess the password as well as for the hacking software.

Te access controls provide a number of mechanisms to an Operating System for authentication, fom which some are Java Virtual Machine (JVM) Sandbox, Acess-matrix model and proof-carrying code mechanism. Tese mechanisms are implemented with a composite security policy within Operating Systems for applying certain rules and restrictions to the user that are diverse based on the users’ roles within a company.

JM Sandbox is an access control mechanism; te JVM is used to limit the access of the user to the users’ machine resources (Operating System) by the Sandbox mechanism. Mlevolent Java binaries are utilized to break the security of JVM; tese are removed by the restrictions of JVM sandbox. Cnversely, tis security configuration can impact the performance of the machine badly. I is imperative to update JVM regularly to prevent security threats but updating security patches on each user machine may frequently makes difficulties. Acess model of two dimensional matrixes used for defining the rights to access objects.

Tis is used for protecting the computer resources/objects represented in rows and columns. Te model allows users to flexibly specify the rights of other users to access the system resources. Dscretionary Access Control (DAC) is a basic flaw in this model having security threats of Trojan Horses which has ability to modify the users’ access rights without directions of system user. Te model is an incomplete solution; terefore it has to be merged with an system that also be helpful in finding out other flaws in the security model.

Poof-carrying code is another mechanism of Access Control which enables users to execute a.. .

This is a preview of the 4-page document
Open full text
Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Engineering and Construction, Agriculture
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Military, Technology
Hire a Writer
preview essay on DQ_Week 2
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us