Question

In: Computer Science

An operating system is termed as trusted if and only if it meets the intended security...

An operating system is termed as trusted if and only if it meets the intended security requirements that is of high quality and justified the user confidence. Based on the facts

a. Compare Trusted System and the Secure System from TWO (2) different perspectives. [4 marks]

b. Use of the password is the ultimate method for user authentication in operating system. Suggest FOUR (4) different kinds of attacks on password. [4 marks]

c. In case the user of windows operating system forget the password, administrator cannot help the users to fetch the password back instead helps to generate the new password. Explain why windows cannot retrieve the same password. Also identify the encryption methods used to save the user password. [7 marks]

Solutions

Expert Solution

Answer)

1) The comparision between the trusted system and the secure system is as mentioned below:

When considering the security engineering then the trusted system is defined as a system which relies on a specific extent for enforcing the security policy whereas this is equivalent for stating that this system would not fail or break the security policy.

On the other hand secure system involves the implementation as well as development with the security countermeasure which has firewall, data encryption, biometrics and the password where the firewall would have software as well as hardware being set among the internal computer network as well as the internet for filtering out the unwanted intrusion.

2) One can use a complex password which would be easily remembered while not easy to be traceable.

Like a combination of upper case, lower case, numbers and symbols.

Some of the security attack on password are as mentioned below:

  • Brute Force attack which is considered an easy approach for the hackers to perform and this is where the hacker mostly uses the computer program for login to that of the user's account with combination of password.
  • Dictonary attack which in turn allows the hacker for accesing a program that is used for cycling with common words and it goes on as letter by letter and hence trying to succeed with the attack.
  • Phishing attack is where social engineering comes into picture where the identity attack mostly uses the social conventions for the workplace which fools the users and hackers would pose as that of the IT team and then ask the user for their password even without fearing for any risk detection.
  • Rainbow table attack wherein the enterprise would hash the password of the user or email and convert those cache as random looking string while these are prevented and hence traced easily then.

3) Windows cannot retrieve the same password as it would have been hashed or encrypted which would have turned into some random string of character which becomes difficult to be traced back and as hashing is a strong identity security method hence windows cannot trace as to which is the hashed word used.

Some of the encryption method is the public key encryption method to be used for saving the user password.

Please comment if you need any other inputs.
Share a like if you find the answer helpful. This would help us learn and share our learning better.
Thank you.


Related Solutions

Media should be trusted, but only when unbiased reputable sources are used. What are examples that...
Media should be trusted, but only when unbiased reputable sources are used. What are examples that support this argument.
One disadvantage of aquaculture is that: a. it meets only one-fifth of the total demand for...
One disadvantage of aquaculture is that: a. it meets only one-fifth of the total demand for fish b. farmed fish eat chow made from wild-caught fish c. it utilizes excess water d. enclosures are too costly to build e. few food crops grow underwater
how to select a Financial System that meets the needs of those that receive it.
how to select a Financial System that meets the needs of those that receive it.
recent legislation was intended to make retirement security more available to millions of workers by all...
recent legislation was intended to make retirement security more available to millions of workers by all of the following except a. addressing the needs of an increasingly mobile workforce through changes such as greater portability b. allowing workers to save more before taxes c. creating more red tape for employers who want to establish pension for their workers d. expanding small business retirement plans
29) Chad finds that he meets the eligibility requirements for Social Security. He elects to receive...
29) Chad finds that he meets the eligibility requirements for Social Security. He elects to receive retirement benefits at 62. Which statement is true? A) He will receive full retirement benefits. B) He will receive retirement benefits only according to his earnings history. C) He will not be eligible for worker's compensation. D) He will receive benefits at a permanently reduced level. E) His exempt amount limits will be lifted. 30) Two management students, Gunther and Jake, discuss the pros...
QUESTION 6 An office manager is testing a new system that is intended to decrease the...
QUESTION 6 An office manager is testing a new system that is intended to decrease the variance of the time customers wait before they relate to a service representative. Under the old system, a random sample of 18 customers had a variance of 250. Under the new system, a random sample of 9 customers had a standard deviation of 11. At α = 0.10, is there enough evidence to convince the manager that the new system has a lower variance?...
Q. Jupiter and its four large Galilean moons are sometimes termed as a ‘mini-solar system’ because...
Q. Jupiter and its four large Galilean moons are sometimes termed as a ‘mini-solar system’ because Jupiter is composed of mainly hydrogen and helium like stars and the Galilean moons seem like planets revolving around it. The total angular momentum of a system is contributed by the sum of orbital and rotational angular momenta of the central body and the bodies orbiting around it. Derive an equation for rotational angular momentum and calculate the same for the Solar System and...
Members of the board of directors of Security First Security First have received the following operating...
Members of the board of directors of Security First Security First have received the following operating income data for the year ended: May 31, 2018: Members of the board are surprised that the industrial systems product line is not profitable. They commission a study to determine whether the company should drop the line. Company accountants estimate that dropping industrial systems will decrease fixed cost of goods sold by $ 80,000 and decrease fixed selling and administrative expenses by $ 10,000....
What is an operating system? What are its functions? What are the types of operating system?
What is an operating system? What are its functions? What are the types of operating system?
Please analyze and summarize the command driven operating system with a GUI operating system in a...
Please analyze and summarize the command driven operating system with a GUI operating system in a paragraph or two.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT