Please read the article “Security Controls for Computer Systems” at the followin
ID: 3844444 • Letter: P
Question
Please read the article “Security Controls for Computer Systems” at the following URL.
http://www.rand.org/pubs/reports/R609-1/index2.html
1. Write a 1–2 page report (single-spaced, not counting quotations used) according to the following requirements. (20 points)
Pick up one specific technical issue related to authentication from the Rand report.
Justify your choice – why is this an authentication issue?
Answer – does the technical issue you choose still exist in today’s computer systems? Why or why not? Elaborate your answer.
I would appreciate your critical thoughts on these questions. Referring to materials beyond the report and the textbook is highly recommended. If you choose to do so, please include a list of references, and use the APA format for citations and references where appropriate. I would appreciate your critical thoughts on these issues.
2. Repeat the same process shown in #1 with a technical issue on access control from the Rand report. All requirements are the same except for the topic you choose for discussion. (20 points)
Explanation / Answer
1)
General definition for Resource-Sharing Computer Systems is that it distribute the capabilities and components of the machine configuration among several users or several tasks. And here I selected the most and important Authentication problem in security that still exist now a days also, i.e., Active Infiltration
Active Infiltration are can be different types. Let us discuss on that
Let have a small discussion on Active Infiltration. We can simply say that Active infiltration is someone being able to get inside the computer and issue instructions to gather information. And they even play with operating system itself.
And this is serious issue now a days also. And computer manufacture’s are trying to provide high levels of authentication and security to handle these.
And other serious problem is Trapdoors, one of the best example is Trojan horse.
Unauthorized entry points can be created by a system programmer who wishes to provide a means for bypassing internal security controls and thus subverting the system.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.