Information Technology Capstone
Paper, Order, or Assignment Requirements
Information Assurance Capstone
You will not have to submit your paper through Turnitin. However, each problem must have reference(s) and if you decide to use the Bishop textbook as one (1) of your reference: you must identify the Chapter and page # of your reference. You will not be allowed to reference Chapter 24 for example without a page # associated with it. When I am grading your paper, I plan on checking out all your references since we will not be using Turnitin for this specific case. Lack of references or incorrect references/problem will result in a failure in your paper.
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
(15 pts.) Chapter 22 (pgs. 642-643) –Problem#2
Question: Consider how a system with capabilities as its access control mechanism could deal with Trojan horses.
a. In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-lists.
b. Consider now the inheritance properties of new processes. If the creator controls which capabilities the created process is given initially, how could the creator limit the damage that a Trojan horse could do?
c. Can capabilities protect against all Trojan horses? Either show that they can or describe a Trojan horse process that C-Lists cannot protect against.