Isolation Solution for Insecure Information Systems
نویسندگان
چکیده
Security has emerged as the biggest threat to information systems. System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and trespassers. As a result, serious damage can be caused either because many intrusions are never detected or because the average detection latency is too long. In this paper, we define Intrusion Confinement through isolation to address such security issue, its importance and finally present an isolation protocol. Keyword: Intrusion detection, Isolation, Information Systems
منابع مشابه
Insecure Context Switching: Inoculating Regular Expressions for Survivability
For most computer end–users, web browsers and Internet services act as the providers and protectors of their personal information, from bank accounts to personal correspondence. These systems are critical to users’ continued lifestyles but often show no evidence of survivability [43], or robustness against present and future attacks. Software defects, considered the largest risk to survivabilit...
متن کاملSanctum: Minimal Hardware Extensions for Strong Software Isolation
Sanctum offers the same promise as SGX, namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an important class of additional software attacks that infer private information from a program’s memory access patterns. We follow a principled approach to eliminating entire attack surfaces through isolation, rather than plugging attack-...
متن کاملPnm-25: Nursing Information Systems: Issues and Challenges
Background: The nursing process is often considered as core of the nursing care delivery and guides the care documentation. Currently, with rapid advance in Information and Communication Technology (ICT) this process can be supported electronically. Applying information systems improves care health processes. Nursing Information Systems (NISs) deal with nursing process. Materials and Methods: E...
متن کاملOnline Fault Detection and Isolation Method Based on Belief Rule Base for Industrial Gas Turbines
Real time and accurate fault detection has attracted an increasing attention with a growing demand for higher operational efficiency and safety of industrial gas turbines as complex engineering systems. Current methods based on condition monitoring data have drawbacks in using both expert knowledge and quantitative information for detecting faults. On account of this reason, this paper proposes...
متن کاملApplication of Shape Memory Alloys in Seismic Isolation: A Review
In the last two decades, there has been an increasing interest in structural engineering control methods. Shape memory alloys and seismic isolation systems are examples of passive control systems that use of any one alone, effectively improve the seismic performance of the structure. Characteristics such as large strain range without any residual deformation, high damping capacity, excellent re...
متن کامل