Identify and describe any obstacles and explain your


Q1 - Context and environment Collapse

In a pervasive computing environment, context plays an important role. Services are provided in a smart way based on the surrounding conditions (i.e., contextual attributes). From a security perspective, security services such as access control have to reflect this fact and be context-aware. With that in mind, consider the following scenario:

Alice, a security researcher, thinks that the role-based access control (RBAC) model, along with all traditional access control models, is not suitable. Bob thinks the opposite. Bob thinks RBAC, for instance, could be used to grant/deny permissions in such an environment.

For this Discussion, you will consider the current access control models you have seen so far and align yourself with either Alice or Bob.

To complete this Discussion:

Post: Take a position in which you agree with either Alice or Bob as described in the example, or if you are somewhere in between. Evaluate the suitability of role-based access control (RBAC) for accommodating contextual information in the access control decision-making process. Identify and describe any obstacles, and explain your solutions for them. Given the access policy, evaluate whether or not Extensible Access Control Markup Language (XACML) could be used to express the contextual attributes.

Q2 - Cracking password management protocols Collapse

One of the best ways to evaluate the security of a password management protocol is to try to crack it yourself. Fortunately, you do not need to be an expert hacker to do this. A number of password cracking tools are available for free online.

For this Discussion, you will choose one example of a password management protocol (this includes password creation, storage, revocation, etc.) in any product suite you have used (e.g., Microsoft, Apple, Adobe, etc.) and discuss its security or insecurity with your colleagues. Then you will install one of the available cracking tools to see whether you can crack this system and share your experience with your colleagues.

To complete this Discussion:

Post: Name the product and the associated password management protocol you selected. Analyse the good and bad practices of this protocol. Install a password-cracking tool and try to crack that product. Then share your experience with your colleagues using screenshots. Recommend ways this protocol could be improved, if possible, and explain the results of the improvements you recommended.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Identify and describe any obstacles and explain your
Reference No:- TGS01147512

Now Priced at $80 (50% Discount)

Recommended (90%)

Rated (4.3/5)

A

Anonymous user

5/28/2016 6:01:55 AM

The assignment illustrated above mainly based on Context and environment Collapse. Scenario: Alice, a security researcher, supposes that the role-based access control (RBAC) model, all along by all traditional access control models, is not appropriate. Bob thinks the opposite. Bob thinks RBAC, for example, could be employed to grant or deny permissions in such an atmosphere. For this illustration, you will consider the current access control models you have seen so far and support yourself with either Alice or Bob. Take a place in which you agree with either Alice or Bob as illustrated in the illustration, or if you are somewhere in between. Assess the suitability of role-based access control for accommodating related information in the access control decision-making process. Recognize and illustrate any obstacles and describe your solutions for them.