Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Discuss the core security mechanisms Windows implements to prevent the attacker from achieving that goal. You must use an approach based on the architectural divisions.

Category: Computer Sciences Paper Type: Case Study Writing Reference: APA Words: 2000

Solution:

Some vulnerabilities exist in Microsoft office that might allow remote code execution. A security update launched for Microsoft office resolves the vulnerability that disclosed publicly as well as sends the report of this vulnerability in Microsoft office privately. The vulnerabilities might give permission to the remote code execution when the user opens the Microsoft word document as specially crafted or if the user opens up the word document, which is located at a similar network directory as a specially crafted library document.

An Attacker might get the same user rights who did successfully exploited either of these vulnerabilities as a logged-on user. Those users who have some user rights or their accounts are configured to take some user rights, or controls could be less impacted rather than users who operate the account as administrative user rights. The update has been introduced for the enhancement of the security which has been rated more important for all of the supported editions of Microsoft office such as Microsoft office 2003, 2004 for Mac, 2007 as well as Microsoft office 2008 for Mac (Stallings, Brown, Bauer, & Bhattacharjee, 2012).

 The vulnerabilities are addressed by the special updated for security throughout the way of correction that the Microsoft office handles the graphics within specially crafted Microsoft Word documents as well as through the manner correction in which Microsoft office loads the external libraries (N. Nissim, 2016).

On the other side, the attacker who wants to see your word document may have a non-privileged account on the system. At that time, the attacker can easily attack and try to break the security in the same network library. When attacker does this, he will try to get administrative rights for viewing the document which you have placed in the particular network directory path. This update is very powerful which can easily handle this situation and make the attacker or any other person non-permit to see the file or document currently. So with the help of this update the attacker cannot access such file as well as the attacker cannot change these controls directly (Salah, Calero, Bernabé, Perez, & Zeadally, 2013).

As mentioned above paragraphs, the system cannot be reachable for the attacker, and he cannot get permission to view such document whether he is on a similar network because all of the ways are closed when the update launched.

Key Issue of the Security update

There is some kind of issues with this security update. As Microsoft knowledge base Article 2489293 has documented the current known issues that the customers of Microsoft Windows and Office can face if they install this security update. This article is also documenting some valuable recommended solutions for these kinds of issues. So, some important recommendations are mentioned following (Marlow, 2010).

Security Vulnerabilities, Issues & Recommendation

By using the Microsoft Update service, the customers can easily configure the update module by activating the windows update options automatically to check the new updates to install in the computer online. Those users of Microsoft Windows who have enabled this feature already they don’t need to configure again because they have already selected this option as well as they will get the latest updated and installed automatically on the fixed defined time that the Windows selected by default. Those users of Microsoft Windows who have not enabled this feature, they should have to enable this option to get the security updates from Microsoft Windows to download the update as well as install it manually.

Failure of Security Architecture and Security Limitation

Part 2

Discussion on the failure of the existing architecture

The user has successfully installed the security updates from Microsoft and believes that his computer security is highly alert, but there are many flaws remain where the wise attacker can attack to get control over the system. As in the information security books, articles, and theories enlightening the fact the security cannot be permanent. The Windows security updates provide you a strong firewall along with a windows defender that makes the computer security as well as shifts or throw any kind of viruses on the chest to delete permanently from the computer.

The Windows defender provides an extra benefit that it secures the computer from unexpected entrances such as attackers. The attackers write some instructional malicious scripts and send it or place in the computers through the internet from any website or through any kind of software or through any ads you clicked on the websites whether you have clicked to close that ad. When you click on the close symbol appeared on the ad, or when you install the additional software or application on the computer, you have given the permission to install the additional software on your computer, the malicious scripts execute and start to retrieve the information, and behind the scene those scripts work in the background. By executing these scripts into the computer, makes firewall of the computer and the security architecture weaker or somehow destroy that is the key for attackers to enter in the computers to get the administrative controls. This is the overview or knowledge of how the attacker can damage the security architecture of the user’s computer to get full control over the system (Han, 2008).

In the technical words, I have brought some valuable information on the failure of existing security architecture. I have found some basic and major reasons that weaken the windows security architecture as we know that Open source software, Linux, Unix, and Mac OS X are always precautious about the security of the system. Comparatively, Windows provides weaker security due to its connectivity with other devices over the network, so it makes the game easier for the attackers to breach. Furthermore on Windows, it also has not shared the weaknesses of the security architecture, which has made the Windows platform much weaker than others, and it is much easy to exploit as well as very difficult to clean it up afterward (M. Suchara, 2011). The major reasons for the failure of the existing security architecture have been listed below.

·         The registry of Windows, as well as the complicated installation of software mess related to it.

·         The port exposed by default

·         The network sharing protocols are poorly designed that failed for the security measures adequately to account.

·         The administrative messaging protocols are poorly designed that failed for the security measures adequately to account.

·         The clients from email are also poorly designed, which provided access to untrusted scripts to spam one’s own contacts unwittingly.

·         The architecture of an integrated web browser that did open the untrusted executable by designing.

Description of Security Architecture

In the world of information security, we love to use the frameworks or architectures to make our security more secure. We have now standards such as ISO 27001/27002 and PCI DSS, regulations such as FISMA, HIPAA as well as a number of different kind of templates, designs as well as the guidelines often grouped under best practices heading. Some companies like to attempt to adhere to these frameworks without having a better understanding of their limitations as well as the applicability.

The PCI DSS is prescriptive about the requirements for the security for its instance. The organizations sometimes misinterpret the PCI DSS according to their budgeting condition as well as by seeing the practices of the business. Several companies and organizations take a try to adopt the PCI DSS model by considering it to secure their non PCI environments without consideration threats as well as the security practices which can be different (Chao, 2011).

We can understand it by an example, considering the number of controls listed as part of ISO 27002. To build an information security program or implant the security architecture, the companies attempt to implement all of them. They do this despite ISO 27001 advising that the controls for their implementation or application totally depend on the needs and objectives, the size, structure, the employed processes as well as the security requirements of the organization

Discussion of security Limitations

There are some limitations of the security architectures. Everyone who has a computer or laptop computer has a security architecture on their computer. These architectures used commonly used to protect the data of the user. These architectures are very beneficial because it gives the red signals to the information stealers or attackers of any kind or external forces which are harmful to your information or data.

On the other side, the architecture has some limitations because we have discussed before that every security in the world is not complete. There are some limitations that exist where the security architecture of your system will fail to handle the breaches. The Windows security updates provide you a strong firewall along with a windows defender that makes the computer security as well as shifts or throw any kind of viruses on the chest to delete permanently from the computer (C. Karlof, 2004).

Some breaches never are stronger by the attackers, and you cannot handle those attacks the security architecture fixed to handle. Because the security architecture only controls those attacks which are defined or know, but some other unknown attacks by scripts can cause the failure of the security architecture. The attackers write some instructional malicious scripts and send it or place in the computers through the internet from any website or through any kind of software or through any ads you clicked on the websites whether you have clicked to close that ad. When you click on the close symbol appeared on the ad, or when you install the additional software or application on the computer, you have given the permission to install the additional software on your computer, the malicious scripts execute and start to retrieve the information, and behind the scene those scripts work in the background. By executing these scripts into the computer, makes firewall of the computer and the security architecture weaker or somehow destroy (Brown, 2003).

References of Failure of Security Architecture and Security Limitation

Brown, D. W. (2003). Application programs for motion control devices including access limitations. Patent and Trademark Office.

C. Karlof, N. S. (2004). TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on Embedded networked sensor systems. 162-175, 162-175.

Chao, L. Z. (2011). Multimedia traffic security architecture for the internet of things. . IEEE Network,, 35-40.

Han, L. G. (2008). A comparative study into architecture-based safety evaluation methodologies using AADL's error annex and failure propagation models In 2008 11th IEEE High Assurance Systems Engineering Symposium. IEEE, 283-292.

M. Suchara, D. X. (2011). Network architecture for joint failure recovery and traffic engineering. In Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems. ACM, 97-108.

Marlow, P. B. (2010). Maritime security: an update of key issues. Maritime Policy & Management,, 667-676.

N. Nissim, A. C. (2016). ALDOCX: detection of unknown malicious microsoft office documents using designated active learning methods based on new structural feature extraction methodology. IEEE Transactions on Information Forensics and Security, 631-646.

Salah, K., Calero, J. M., Bernabé, J. B., Perez, J. M., & Zeadally, S. (2013). Analyzing the security of Windows 7 and Linux for cloud computing. computers & security. Analyzing the security of Windows 7 and Linux for cloud computing. computers & security, 113-122.

Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: principles and practice. Upper Saddle River, NJ, USA: Pearson Education., 978.

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Class Engineers

ONLINE

Top Class Engineers

1218 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed