Question: (a) A project is defined as a temporary endeavour undertaken to unique product, service, or result, and these are some of the attributes of a

(a)A project is defined as a temporary endeavour undertaken to unique product, service, or result, and these are some of the attributes of a project:

Is temporary

Has a deliverable

Has a unique purpose

Requires resources, often from various areas

Involves uncertainty/risk

The research project described in the abstract below is temporary as it will have ended once the data analysis was done and the findings were published. Briefly describe how each of the other attributes listed above apply to the project.

(4 marks)

Protecting end users from security threats is an extremely difficult, but increasingly critical, problem. The functionality-based application confinement (FBAC) model is designed to allow end users with limited expertise to assign applications hierarchical and parameterised policy abstractions based upon the functionalities each program is intended to perform. To validate the feasibility of this approach and assess the usability of existing mechanisms, a usability study was conducted comparing an implementation of the FBAC model with the widely used Linux-based SELinux and AppArmor security schemes. The results showed that the functionality-based mechanism enabled end users to effectively control the privileges of their applications with far greater success than widely used alternatives. In particular, policies created using FBAC were more likely to be enforced and exhibited significantly lower risk exposure, while not interfering with the ability of the application to perform its intended task. In addition to the success of the functionality-based approach, the usability study also highlighted a number of limitations and problems with existing mechanisms. These results indicate that a functionality-based approach has significant potential in terms of enabling end users with limited expertise to defend themselves against insecure and malicious software.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!