These questions are from the discretionary and mandatory access control modules. All students in a class belong to a group G and are able to access class resources because G is granted the necessary permissions. Assume Alice has tested out of a topic and does not need to take the quiz Q on this topic. The professor does not want Alice to have access to Q but wants Alice to remain in group G so she can access other resources. Also, the professor wants to grant access to Q to all other students by granting the desired access to G. The mechanisms provided by various operating systems can be used to meet this access control requirement. Explain how this can be achieved most efficiently and correctly in Linux with extended access control lists (EACLs) and in Windows. First, provide the access control entries (ACEs) for Alice and G with their types and permissions for the quiz Q in each system. After this, discuss which of these ACEs will be checked if Alice tries to gain access to the quiz Q and is denied access. (2+2+2+2 pts.) The Bell and La Padula (BLP) and Biba models address confidentiality and integrity of data in a system that supports mandatory access control. A system allows read-down as is done by BLP, and writes by a user are only allowed at the user’s level (no writes to higher levels are allowed). Does this system satisfy the confidentiality and integrity goals of the BLP and Biba models? First, describe the BLP and Biba requirements and then explain if the requirements of each model are satisfied. (2+2+2+2 pts.) A certain company has many customers and some of them have conflict-of-interest (CoI) relationships. Also, employees can only access company data by executing applications approved by the company based on the functions they perform in the company. The people responsible for access provisioning in this company came up with the following scheme. All files of a given customer must be stored in a single directory (it could be a container-like unit when using cloud storage). Initially, users are allowed to execute applications based on their needs and each application is granted access to files required for its execution. Access could be removed when applications execute. In particular, when user U executes application A which accesses files from customer C’s directory, access to all files in directories of customers who have a CoI relationship with C is turned off for application A when it is executed by U. Give two examples of policies discussed in the mandatory access control module of the course that could be used to control access to documents by this company. Explain your answer by discussing the specific data access requirements of the company that are satisfied by each policy. (2+2 pts.) Does the suggested implementation correctly enforce each policy that you recommend for the company? Provide a brief justification for your answer. (4+4 pts.)
The scores on a test have been organized into the stem-and-l…
The scores on a test have been organized into the stem-and-leaf plot below. What is the range of this data?
Short Answer 4 (10 pts): In paragraph form, define your four…
Short Answer 4 (10 pts): In paragraph form, define your fourth chosen term, provide its historical context (when/where), and its significance in US History. PotosiElizabeth Key Salem Witch TrialsBoston MassacreBacon’s RebellionTea Act, 1773Proclamation Line of 1763
Argumentative Essay Response (50 pts)–In an argumentative e…
Argumentative Essay Response (50 pts)–In an argumentative essay format, answer one of the two prompts provided. You are expected to answer your prompt thoroughly, complete with thesis statement, supporting paragraphs, and conclusion. You are not graded on writing ability. However, your essay should be specific and clear enough to defend your argument. Compare/Contrast the different colonization projects in the Americas. Which European empire do you believe was most successful in the Americas? How did they achieve such success? Makes sure you are defining “success” in your answer and including social, political, and economic evidence to justify your reasoning. How would you describe the relationship between Natives and Europeans? Be sure to include evidence from multiple Empires in order to fully develop your argument.
The tendency to search for, interpret, or recall information…
The tendency to search for, interpret, or recall information in a way that confirms one’s beliefs or hypotheses is
A woman feels attracted to someone she works with but accuse…
A woman feels attracted to someone she works with but accuses her partner of flirting with others. This is an example of
Consider the data below: 5 8 15 20 26 28 29 31…
Consider the data below: 5 8 15 20 26 28 29 31 32 34 35 35 36 39 40 43 48 51 Find Find Find the IQR. Does this data have any outliers? If so, what are they? If not, why not? Use the definition of outlier that involves the IQR to explain your response.
Consider a normal distribution with a mean of 120 and a stan…
Consider a normal distribution with a mean of 120 and a standard deviation of 6. Use the Empirical Rule to determine the proportion of data values between 108 and 114. Draw yourself a curve like the one below to help you answer this question.
Which commonly assessed category of cognition as part of neu…
Which commonly assessed category of cognition as part of neuropsychological evaluation comprises interrelated self-regulatory control processes involved in the selection, initiation, organization, execution, and monitoring of goal-directed behavior?
Which of the following is a defense mechanism that offers ex…
Which of the following is a defense mechanism that offers explanation to justify beliefs or behaviors that otherwise would be unacceptable?