Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

DQ_Week 2 Essay Example

This is a preview of the 4-page document
Read full text

Different cryptography, encryption decryption, involvement of special characters, mixture of small and capital characters along with numbers, self generation algorithm as done by William H. Haubert (2002) etc. or the second way could be to generate a rule based system to create the surreptitious set of rules and regulations, control the rules that would be associated to the users and subsequently, the actual login interface for the said system.The above design will not allow users to select an easy password like MS Outlook’s Password Management Protocol. As the design is based on an interaction with the user’s secret questions and an involvement of randomness makes it harder for intruders to guess the password as well as for the hacking software.The access controls provide a number of mechanisms to an Operating System for authentication, from which some are Java Virtual Machine (JVM) Sandbox, Access-matrix model and proof-carrying code mechanism. These mechanisms are implemented with a composite security policy within Operating Systems for applying certain rules and restrictions to the user that are diverse based on the users’ roles and responsibilities within a company.JVM Sandbox is an access control mechanism; the JVM is used to limit the access of the user to the users’ machine resources (Operating System) by the Sandbox mechanism. Malevolent Java binaries are utilized to break the security of JVM; these are removed by the restrictions of JVM sandbox. Conversely, this security configuration can impact the performance of the machine badly. It is imperative to update JVM regularly to prevent security threats but updating security patches on each user machine may frequently makes difficulties.Access Matrix model composed of two dimensional matrixes used for defining the rights to access objects. This is used for protecting the computer resources/objects represented in rows and columns. The model allows users to flexibly specify the rights of other users to access the system resources. Discretionary Access Control (DAC) is a basic flaw in this model having security threats of Trojan Horses which has ability to modify the users’ access rights without directions of system user. The model is an incomplete solution; therefore it has to be merged with an auditing system that can also be helpful in finding out other flaws in the security model.Proof-carrying code is another mechanism of Access Control which enables users to execute a

This is a preview of the 4-page document
Open full text
Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Technology, Engineering and Construction
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Military, Agriculture
Hire a Writer
preview essay on DQ_Week 2
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us