Consider the following enforcement mechanisms. State a policy that the mechanism
ID: 3746183 • Letter: C
Question
Consider the following enforcement mechanisms. State a policy that the mechanism might be helping to enforce: (a) A password changing program will reject passwords that are less than five characters long or that are found in the dictionary. Mechanisms: Policy: (b) The login program will disallow logins of any students who enter their passwords incorrectly three times. (c) The permissions of the file containing Carol's homework will prevent Robert from cheating and copying it. (d) when web traffic climbs to more than 80% of the network's capacity, systems disallow any further communications to or from Web servers. (e) Annie, a systems analyst, will be able to detect a student using a program to scan her system for vulnerabilities (f) A program used to submit homework will turn itself off just after the due date.Explanation / Answer
a) A password-changing program will reject passwords that are less than five characters long or that are found in the dictionary
Mechanism :The mechanism is the Authentication in which the program that checks for the passwords less than 5 characters and rejects them .
Policy: The policy used here is that easily guesses passwords are not allowed
b) The login program will disallow logins of any students who enter their passwords incorrectly three times
Mechanism : The mechanism used here is that after failing three times to login into an account , the account is disabled
Policy : The policy here is that only authorized students are allowed to login.
c) The permissions of the file containing Carol’s homework will prevent Robert from cheating and copying it.
Mechanism :The mechanism used here is authentication , The read access is restricted by the file protection mechanism.
Policy : The policy used here is the Confidentiality that no student can read another student’s homework
d) When World Wide Web traffic climbs to more than 80% of the network’s capacity, systems will disallow any further communications to or from Web servers.
Mechanism :The mechanism used here is to response and block the traffic when the traffic is more than 80% of the network’s capacity in WWW.
Policy : The policy used here is to monitor the World Wide Web to not interfere with other network traffic
e) Annie, a systems analyst, will be able to detect a student using a program to scan her system for vulnerabilities.
Mechanism : The mechanis used here is that which is used by Annie to detect the scanning
Policy : The policy used here is to monitor that systems may not be scanned for vulnerabilities by students.
f) A program used to submit homework will turn itself off just after the due date.
Mechanism :The Mechanism used is that the program is disabled after its due date
Policy : The policy used here is that late homework submitted is not accepted