preview

Nt1310 Unit 3 Case Study

Decent Essays

Section 2 1. The global permission acceptance breaks the policy of least privilege due to the fact that it allows access to items that a user believes to be protected and are not due to the fact that it is placed in an open environment. The open environment is out there and is available to all who happen to be connected. The concept of the least privilege is that it limits who is able to access an item. The item is able to be accessed only after permission have been granted by the owner. When the global acceptance is utilized there is really no control over who is able to see the information due to the fact that the security has been removed to make it easier to be used. Although there are instances where an application has to be granted permission …show more content…

The new Marshmallow Android OS does it adhere to the least privilege by allowing the user to revoke permissions. In some ways I would say that it does adhere to the least privilege in the fact that it does allow the user to revoke access to the app at any time he or she no longer wants to share that particular app. However I think that while that app is open and it is being shared how the user can ultimately know for sure that once he or she has turned off the permission that it has really been turned off. If a user has granted access to a known person that they trust can he or she know for certain that the trusted person has not been compromised and therefore can compromise him or her? Also with the new system it also allows the user to store passwords for easier access of apps on the phone so that he or she will not have to login to the app to utilize it. I do not think that this will follow the least privilege concept due to the fact that anyone who is able to connect to through a trusted source then will have access to app information that really should not be granted. In addition if the person has his or her phone compromised then that secure information is also then compromised as well. Information for this question was gathered from the website

Get Access