WINDOW ACCESS CONTROL SYSTEM: ITS DESIGN AND IMPLEMENTATION

Type: Project Materials | Format: Ms Word | Attribute: Documentation Only | Pages: 60 Pages | Chapters: 1-5 chapters | Price: ₦ 3,000.00

2,391 marked this research material reliable.
Call or whatsapp: +2347063298784 or email: info@allprojectmaterials.com
WINDOW ACCESS CONTROL SYSTEM: ITS DESIGN AND IMPLEMENTATION

Introduction
In computer security, window access control (WAC) refers to a type of access control which the operating system (OS) constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, input and output devices etc. Subjects and objects each have a set of security attributes.
Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kennel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object will be tested against the set of authorization rules (aka policy) to determine if the operation is allowed. According to Pete Sclafani (2002), database management system, in its access control mechanism, can also apply window access control. With window access control, this security policy is centrally controlled by a security policy administrator. Users do not have the ability to override the policy to grant access to files that would otherwise be restricted. By contrast, discretionary access control (DAC), which also governs the ability of subjects to access objects, allows users the ability to make policy decisions or assign security attributes. WAC-enabled systems allow policy administrators to implement organization-wide security policies. Unlike with DAC, users cannot override or modify this policy, either accidentally or intentionally. This allows security administrators to define a central policy that is guaranteed (in principle) to be enforced for all users. According to Barkley J., (1997) MAC has been closely associated with multi-level secure (MLS) systems. The Trusted Computer System Evaluation Criteria (TCSEC), the seminal work on the subject which is often referred to as the "Orange Book", defines WAC as "a means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (i.e., clearance) of subjects to access information of such sensitivity". Early implementations of WAC such as Honeywell's SCOMP, USAF SACDIN, NSA Blacker, and Boeing's MLS LAN focused on MLS to protect military-oriented security classification levels with robust enforcement. Originally, the term WAC denoted that the access controls were not only guaranteed in principle, but in fact. Early security strategies enabled enforcement guarantees that were dependable in the face of national lab level attacks. More recently, with the advent of implementations such as SELinux (incorporated into Linux kernels, Window Integrity Control (incorporated into Windows Vista and newer), and window schemes derived from the FreeBSD WAC Framework in OS, iOS, and Junos, WAC has started to become more mainstream and is evolving out of the MLS niche. These more recent WAC implementations have recognized that the narrow TCSEC definition, focused as it was on MLS, is too specific for general use Cavale M., and McPherson D., (2003). These implementations provide more depth and flexibility than earlier MLS-focused implementations, allowing (for example) administrators to focus on issues such as network attacks and malware without the rigor or constraints of MLS systems.
TABLE OF CONTENTS
Title Page    
Certification
Dedication   
Acknowledgement
Abstract        -     
Table of Contents 

CHAPTER ONE – INTRODUCTION
1.0      Introduction
1.1      Theoretical Background
1.2      Statement of Problem  
1.3      Aims and Objectives of the Study         -           -           -           -          
1.5      Scope of the Study                        -           -           -           -           -    

      organization of the Research      -           -           -           -           -          
1.7      Definition of Terms            -           -           -           -           -           -   

CHAPTER TWO: LITERATURE REVIEW
2.0      Introduction                        -           -           -           -           -           -           -          
2.1      Concept of Windows Access Control    -           -           -           -       
2.2      Types of Windows Access Control        -           -           -           -          
2.2.1  Policies, Models and Mechanism           -           -           -           -          
2.3      Windows Account Overview      -           -           -           -           -       
2.4      Logical Model of Access-Control Interaction  -           -           -     
2.4.1  Security Bugs Found          -           -         -           -           -           -            
2.5      Access Control List (ACL) and Limitation        -            -           -          

CHAPTER THREE: SYSTEM DESIGN AND ANALYSIS
3.0      Introduction            -           -           -           -           -           -           -           -          
3.1      Research Methodology    -           -           -           -           -           -          
3.2      System Analysis      -           -           -           -           -           -           -          
3.2.1  Analysis of the Existing System               -           -           -           -          
3.2.2  Problem of the Existing System  -           -           -           -           -          
3.2.3  Analysis of the Proposed System           -           -           -           -          
3.2.3.1          Advantages of the Proposed System    -           -           -          
3.2.3.2         Disadvantages of the Proposed System          -           -          
3.3      System Design         -           -           -           -           -           -           -          
3.3.1  Input Layout            -           -           -           -           -           -           -          
3.3.2  Program Flowchart           -           -           -           -           -           -          
3.3.3  Output Format       -           -           -           -           -           -           -          
CHAPTER FOUR -               SYSTEM IMPLEMENTATION AND DOCUMENTATION
40       Introduction            -           -           -           -           -           -           -          
4.1      System Design Diagram   -           -           -           -           -           -          
4.2      Choice of Programming Language        -           -           -           -          
4.3      Analysis of Modules          -           -           -           -           -           -          
4.4      Programming Environment        -           -           -           -           -          
4.4.1  Hardware Requirement   -           -           -           -           -           -          
4.4.2  Software Requirement     -           -           -           -           -           -          
4.5      Implementation      -           -           -           -           -           -           -   

CHAPTER FIVE     –    SUMMARY, CONCLUSION AND
RECOMMENDATION
5.0      Introduction            -           -           -           -           -           -           -           -          
5.1      Constraints of the Study -           -           -           -           -           -          
5.2      Summary      -           -           -           -           -           -           -           -          
5.3      Conclusion   -           -           -           -           -           -           -           -          
5.4      Recommendations -           -           -           -           -           -           -          
References   -           -           -           -           -           -           -           -          
Appendix A (Program Flowchart)         -           -           -           -   
Appendix B (Source Code)           -           -           -           -           -   
Appendix C (Output Format)      -           -           -           -           -   

WINDOW ACCESS CONTROL SYSTEM: ITS DESIGN AND IMPLEMENTATION

Additional Information

  • The Project Material is available for download.
  • The Research material is delivered within 15-30 Minutes.
  • The Material is complete from Preliminary Pages to References.
  • Well Researched and Approved for supervision.
  • Click the download button below to get the complete project material.

Frequently Asked Questions

In-order to give you the best service available online, we have compiled frequently asked questions (FAQ) from our clients so as to answer them and make your visit much more interesting.

We are proudly Nigerians, and we are well aware of fraudulent activities that has been ongoing in the internet. To make it well known to our customers, we are geniune and duely registered with the Corporate Affairs Commission of the republic of Nigeria. Remember, Fraudulent sites can NEVER post bank accounts or contact address which contains personal information. Free chapter One is always given on the site to prove to you that we have the material. If you are unable to view the free chapter 1 send an email to info@allprojectmaterials.com with the subject head "FREE CHAPTER 1' plus the topic. You will get a free chapter 1 within an hour. You can also check out what our happy clients have to say.


Students are always advised to use our materials as guide. However, if you have a different case study, you may need to consult one of our professional writers to help you with that. Depending on similarity of the organization/industry you may modify if you wish.


We have professional writers in various disciplines. If you have a fresh topic, just click Hire a Writer or click here to fill the form and one of our writers will contact you shortly.


Yes it is a complete research project. We ensure that our client receives complete project materials which includes chapters 1-5, full references, questionnaires/secondary data, etc.


Depending on how fast your request is acknowledged by us, you will get the complete project material withing 15-30 minutes. However, on a very good day you can still get it within 5 minutes!

What Clients Say

Our Researchers are happy, see what they are saying. Share your own experience with the world.
Be polite and honest, as we seek to expand our business and reach more people. Thank you.

A Research proposal for window access control system: its design and implementation :
Reviews: A Review on window access control system: its design and implementation , window, access, control project topics, researchcub.info, project topic, list of project topics, research project topics, journals, books, Academic writer.
In computer security, window access control (WAC) refers to a type of access control which the operating system (OS) constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In practice, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/UDP ports, shared memory segments, input and output devices etc. Subjects and objects each have a set of security attributes. .. computer science project topics

WINDOW ACCESS CONTROL SYSTEM: ITS DESIGN AND IMPLEMENTATION

Project Information

  • CATEGORY : COMPUTER SCIENCE
  • TYPE : PROJECT MATERIAL
  • FORMAT : MICROSOFT WORD
  • ATTRIBUTE : Documentation Only
  • PAGES : 60 Pages
  • CHAPTERS : 1 - 5
  • PRICE : ₦ 3,000.00

Share Links

Download Post
Download Post

Search for Project Topics

Project topics in Departments

Do you need a writer for your academic work?