WORM is not enough !
نویسنده
چکیده
Important documents like financial reports, customer communications etc are increasingly being maintained by businesses in electronic format. These represent much of the data on which key decisions in business operations are based and hence must be maintained in a trustworthy fashion safe from destruction or clandestine modification. Secure retention of such data is also increasingly being regulated by govt regulations like Sarbanes-Oxley Act or SEC Rule 17a 4. Thus there has been a recent rush to introduce Write-Once-Read-Many (WORM) storage devices. In this paper, we argue that simply storing records in WORM storage, as is the current focus, is far from adequate to ensure that the records are trustworthy. The key issue is that for data to be truly trustworthy its entire lifecycle has to be secured: starting from the process of creating it, to storing & maintaining it and finally retrieving. In this paper we show that it is possible to compromise both the maintenance and retrieval of records even if it is maintained on WORM.
منابع مشابه
NSME: A Framework for Network Worm Modeling and Simulation
Various worms have a devastating impact on Internet. Packet level network modeling and simulation has become an approach to find effective countermeasures against worm threat. However, current alternatives are not fit enough for this purpose. For instance, they mostly focus on the details of lower layers of the network so that the abstraction of application layer is very coarse. In our work, we...
متن کاملMicro worm, culture method and its application in ornamental larviculture
In the culture of freshwater and saltwater aquatic species, feeding is one of the most challenging stages. During this period of life, larvae are very sensitive and many of them need special food to meet their needs, if the food does not meet the needs of larvae in terms of nutrient composition and physical characteristics such as size and shape, the survival and growth of the larvae will be se...
متن کاملModeling, Analysis, and Mitigation of Internet Worm Attacks
In recent years, worms have become one of the major threats to the security of the Internet. In this talk, I will present our research on modeling, analysis, and mitigation of Internet worm attacks, which includes: (1) We present a “two-factor worm model”, which considers the impact of human counteractions and network congestion on a worm's propagation. (2) To detect the presence of an Internet...
متن کاملWormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees
Problem. Large-scale worm outbreak is one of the major security threats to today’s Internet. Network worms exploit the vulnerabilities of widely deployed homogenous software to self-propagate quickly. Moore et al [3] show that the react time of worm containment is only a few minutes and the signature-based filtering is more efficient than source-address filtering. Recent work by Earlybird [4] a...
متن کاملMonitoring and Early Detection for Internet Worms
After several Internet-scale worm incidents in recent years, it is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to our society. Facing this great security threat, we must build an early detection system to detect the presence of a worm as quickly as possible in order to give people enough time for counteractions. In this paper, we firs...
متن کاملCreation of the importance scanning worm using information collected by Botnets
0140-3664/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.comcom.2009.11.012 * Corresponding authors. Tel.: +1 814 863 0641. E-mail addresses: [email protected] (Y.-H. Choi), pl snu.ac.kr (S.-W. Seo). Importance scanning worm exploits a non-uniform distribution of vulnerable hosts on the Internet. To realize an importance scanning worm, the attacker needs to obtain or estimate the distrib...
متن کامل