write a response to this post with 150 words, use your own words plz, thank you
ID: 3851694 • Letter: W
Question
write a response to this post with 150 words, use your own words plz, thank you
------------
The Chromium OS model uses sandbox technique to isolate the web application from each other so that when one of the web application gets affected it does not spread to other web application or neither to the system. But the major flaw here is that what happens if the sandbox fails or is bypassed the security of the entire surrounding is being compromised.
Another flaw which I noticed is that, it is given that all the user data is encrypted and stored on a separate partition, but the important part that is missing is encryption can only be a part of the more comprehensive and multi-part security system but not just the only one employed to protect the data. Because the encrypted data when transmitted between systems have a higher rate to reach its destination decrypted rather than reaching in a secured way. Moreover, data encryption mainly relies on passwords to decrypt the files, if a user selects a weak password then there is a higher rate of vulnerability to the data.
The security issues that exist with chromium are an “ opportunistic and dedicated adversary. The opportunistic adversary is related to compromising only an individual's machine or data with an intention to gain unwarranted privileges. The dedicated adversary deals with targeting either a user or an enterprise with an intention to steal data or account credentials which can they use to exploit the user's confidential data by re-selling the data to make money. The hackers can alter the DNS registration to redirect visitors to the page with their logo when users enter their credentials they fall prey to the hackers attack loosing their confidential data.
Explanation / Answer
The paragraph details the vulnerabilities that are inherent in the Chromium OS. Though OS deals the task by providing security in a very rudimentary way of separating the web application is a way of making sure that infestation at one web application doesn't affect the other.
- Chromium fails to inculcate the what-if scenarios in their security apparatus by checking the robustness and reliability of the entity itself that makes this separation between web application possible namely the Sandbox.
- Encryption mechanism that is followed is also fraught with vulnerabilities as the encryption key is set by the strength of passwords that user chooses rather than complex algorithms with long keys, this makes Chromium encryption process all the more fragile.
- Chromium with its shaky security apparatus can even invite opportunistic adversary who is out there on cyberspace for an opportunity of getting the most by hacking into a user's computer.
- Chrome is all the more vulnerable with dedicated adversary who can use the user’s machine as a medium to hack into the enterprises system to cause maximum infrastructural damage or personal and intellectual theft. Chrome OS is also vulnerable for any intended Phishing attacks.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.