๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Compliance vs business security

โœ Scribed by Dario Forte


Publisher
Elsevier Science
Year
2009
Tongue
English
Weight
302 KB
Volume
2009
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


This exploit overflows a buffer used in the handling of paginit's commandline arguments, providing elevated privileges. Pass or fail criteria: Pass or Identified Packet loss: No

Extended work

There are several developments that would be worth exploring. In the distributed environment, given an intrusion at the guest applications level that is detected by the self-healing mechanism, it may be be possible to make a spoof call to the host OS so that: 1. The host OS will execute the spoofing code and transfer the hacker's packets to some other useless system, while application packets are still communicated to the actual system using self-monitoring of the IDS. 2. The trusted environment will provide self-healing mechanisms for applications. 3. Once we trace the hacker and take countermeasures, we can make an anti-spoof call from the host OS. 4. Spoofing code can be added to the IDS source code and its policies.

Conclusion

We have provided an overview of a novel architecture for enhanced security using virtualisation and spoofing. In this architecture, the guest operating system is considered as a production system and the host operating system is considered as a trusted system. This architecture can provide self-monitoring and self-healing mechanisms within a safe environment, so the mechanisms themselves are not compromised.


๐Ÿ“œ SIMILAR VOLUMES


Internet security for business to busine
๐Ÿ“‚ Article ๐Ÿ“… 1997 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 143 KB

October 7 997 Network Security and firewall technology which is ideally suited to mass electronic commerce services, such as home banking and virtual shopping.

Securing your business process
โœ Brian S. Collins; Steve Mathews ๐Ÿ“‚ Article ๐Ÿ“… 1993 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 576 KB
Security for small business computers
โœ PeterP.C.H. Kingston; Martin Goulbourn ๐Ÿ“‚ Article ๐Ÿ“… 1986 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 108 KB