Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please read the article “Security Controls for Computer Systems” at the followin

ID: 3844444 • Letter: P

Question

Please read the article “Security Controls for Computer Systems” at the following URL.
http://www.rand.org/pubs/reports/R609-1/index2.html
1. Write a 1–2 page report (single-spaced, not counting quotations used) according to the following requirements. (20 points)
Pick up one specific technical issue related to authentication from the Rand report.
Justify your choice – why is this an authentication issue?
Answer – does the technical issue you choose still exist in today’s computer systems? Why or why not? Elaborate your answer.
I would appreciate your critical thoughts on these questions. Referring to materials beyond the report and the textbook is highly recommended. If you choose to do so, please include a list of references, and use the APA format for citations and references where appropriate. I would appreciate your critical thoughts on these issues.
2. Repeat the same process shown in #1 with a technical issue on access control from the Rand report. All requirements are the same except for the topic you choose for discussion. (20 points)

Explanation / Answer

1)

General definition for Resource-Sharing Computer Systems is that it distribute the capabilities and components of the machine configuration among several users or several tasks. And here I selected the most and important Authentication problem in security that still exist now a days also, i.e., Active Infiltration

Active Infiltration are can be different types. Let us discuss on that

Let have a small discussion on Active Infiltration. We can simply say that Active infiltration is someone being able to get inside the computer and issue instructions to gather information. And they even play with operating system itself.

And this is serious issue now a days also. And computer manufacture’s are trying to provide high levels of authentication and security to handle these.

And other serious problem is Trapdoors, one of the best example is Trojan horse.

Unauthorized entry points can be created by a system programmer who wishes to provide a means for bypassing internal security controls and thus subverting the system.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote