Pbs Essay, Research Paper
PROCESS BASED SECURITY, WHAT IS IT AND HOW IT WILL CHANGE YOUR COMPUTER?S LIFE
This note is for the purpose of explaining a new way to implement operating system security called process-based security. First, an explanation of traditional operating system security is given. Next, an explanation of process-based security is given. Finally, there are presented three examples of failure on the part of traditional security with how process-based security would not have allowed such a problem.
Before talking about process-based security, it is important to go over current state of the art in operating system security. As operating systems are implemented today, security is designed to give access to resources based on a user who has been identified. When it comes time to make a resource available to a running program, the operating system checks to see if the user, who is associated with the program, has rights to the resource. No consideration is given as to what the program itself might need with regard to the requested resource. This current view of security has the disadvantage of allowing programs access to resources outside of their intended use, i.e. using a hex editor to work with accounting files.
In a process-based security system, access to resources is based on the process running. When the administrator of a system loads a new program onto that system, he/she determines the needs of the program and sets up the security profile for it. As the program runs on the system and requests access to resources, its security profile is checked, to determine whether the resource can be made available. The operating system is not concerned with who initiated the requesting program, only what the program wants. User interface programs can be installed to control what programs are available to what users.
In the early days of UNIX, one quick way to determine user passwords was to encrypt all the words in an English dictionary, get a copy of the password file, and compare the two. The password file only needs to be accessible to the login program and user maintenance program. With UNIX?s security based on users or groups of users, restricting access to just those programs is not possible. Thus people had read-only access to the password file and were clever enough to figure out the relationship of passwords to common English words. In process-based security, no access could have been made to the file, because it is very easy to restrict only the login or user maintenance programs to see/use the file.
A much more pressing need for process-based security has surfaced because of internet browsers and has become elevated with the addition of Java. An internet browser without Java can be used to obtain information about the user?s computer outside of their control. An internet browser with Java can be used to destroy any data the user normally accesses. With process-based security, the internet browser could be given a profile allowing limited access to a ?just-in-case? directory only, not allowing any other access that could be potentially harmful. Most people think the Java access security built into browsers can keep this from happening. However, Java code can be written to test what type of machine is currently being used, then call machine specific code that uses the operating system directly, bypassing the browser?s safeguards. There are over fifty-million IBM-style personal computers out there running Windows with Java enabled browsers that virus writers would love to tackle.
Today computer viruses seem to be the norm. A malicious program attaches itself to a friendly program, causing the friendly program to terrorize the system. In two ways this is stopped with process-based security. First, the virus, being unknown to the system, would not have a security profile allowing it to access any files or I/O ports, thus keeping it from running or infecting in the first place. Secondly, if the friendly program was infected, before being loaded by the administrator, the extent of damage is minimized. No program is going to be given free rein of the system, and access rights are not increased when the program is run by the administrator.
Operating system security has always been looked at from the perspective of what the user should be able to access. Unfortunately that allows files and devices to be accessed by programs other than those programs originally intended to manipulate those files and devices. When operating system security is looked at from the angle of what a program should be using, not only can access be given on an ?as needed basis? only, but security installed in programs themselves, cannot be defeated by simply accessing the data files outside of the intended program.
In conclusion, it is important to remember ?people don?t delete files, programs do.? Restricting a program?s access to what it needs is the best way to keep out unwanted deletions or additions. Process-based security gives you a much better handle on how your computer/network is used and makes it a much more secure environment against malicious or na?ve attacks thus making your life and your computer?s life less complicated.
Другие работы по теме:
Process Essay Essay Research Paper Process EssayI
Process Essay Essay, Research Paper Process Essay I have found an effective way of getting ready in the morning that saves me time. I am going to share this information with my friend Stephanie. The order in which I get
Writing Process Essay Research Paper Writing a
Writing Process Essay, Research Paper Writing a paper on the writing process is pretty hard. The writing process is different from one person to another. You come across questions like, What exactly is the writing process? and Must you follow one persons writing process if yours is different? This is where I came across the answer to my questions, write however you wish to write.
Electoral Systems Essay Research Paper From my
Electoral Systems Essay, Research Paper From my limited studies of comparative government I have come to the conclusion that a plurality type of electoral process where winner takes all is a superior compared to proportional representation for several key reasons. Proportional representation is based on having an election based on census instead of consensus.
Personal Injuries Essay Research Paper Security Committee
Personal Injuries Essay, Research Paper Security Committee Topic A: Disarmament of Paramilitary Groups in the Former Yugoslavia Argentina The Committee on Disarmament and International Security has taken upon the task of disarming paramilitary groups in Yugoslavia. It is important that we examine states’ policies toward disarmament and prevention of the proliferation of light weapons.
The Computer Age Essay Research Paper Ben
The Computer Age Essay, Research Paper Ben Purdue 8/24/01 It is my prediction that the biggest issue we will face in the coming century not only as a nation but also as a planet is finding a blind between security of protected information and freedom of information. I say this because as a computer security consultant I understand the need for security of important information, however I as a programmer I understand such issues as the battle for open source code and freedom of information as a hole.
British Constitution Essay Research Paper Amendment IIRight
British Constitution Essay, Research Paper Amendment II [Right of people to bear arms not to be infringed.] A well regulated militia, being necessary to the security of a free State, the right of the people to keep and bear arms, shall not be infringed.
Commercials Essay Research Paper In every young
Commercials Essay, Research Paper In every young person life there are certain critical decisions that must be made. One of the more important of the many is the choice to resume education after high school. After that decision is made the choice of which college to go to comes into play. In making this decision you must first do research on schools that interest you, you must visit these campuses, and last you must apply to the schools of your choice.
NT Model Essay Research Paper When Windows
NT Model Essay, Research Paper When Windows NT was developed the designers ensured that security features were built in unlike when for example when MS Dos was developed. By default NT
Haber Process Essay Research Paper HABER PROCESSYou
Haber Process Essay, Research Paper HABER PROCESS You are to develop a new industrial plant in the area and a committee has decided that a new ammonia facility is to be built. This plant will use the Haber process in the ammonia production. The ammonia will eventually be used in the production of ammonium nitrate fertilizer.
Social Security 2 Essay Research Paper Social
Social Security 2 Essay, Research Paper Social security is very essential for most of today s older Americans. Since it was begun, it has been a sort of protection for retired workers, and for disabled workers. Social Security allows people to live independently and still have their dignity. There are about 150 million workers protected by Social security and more then 44 million people receive Social Security benefits.
Land Mines Essay Research Paper Land mines
Land Mines Essay, Research Paper Land mines greatly contribute to the danger of international security because they are used as military weapons. Because land mines have caused great destruction there has been an effort from international and non-governmental organizations to ban mines and clear areas infected with them.
Common Ground Essay Research Paper In the
Common Ground Essay, Research Paper In the video, Common Ground, several ways of alternative organic farming are discussed. Although the tape is somewhat outdated, it still is effective in showing what changes have been made in farming and the issues concerning farmers and the environment. The main objective of the video is showing the process of coming together and meeting in the middle between the farmer and environmentalist, just as it is titled, Common Ground.
Gilgamesh Essay Research Paper Reading Response Epic
Gilgamesh Essay, Research Paper Reading Response: Epic of Gilgamesh There are questions of what tomorrow may bring. How will we handle the things life has to offer us? We don’t always know how we will react. These questions can be triggered by physical aging or a change in the lifestyle. With age come the questions of morality.
Process Of Meiosis Essay Research Paper Meiosis
Process Of Meiosis Essay, Research Paper Meiosis is the reproduction of sex or germ cells in which there are two divisions required to complete the process. They are called meiosis I and meiosis II. In meiosis I, members of homologous pairs of chromosomes divide into two complete sets. There are four stages: prophase I, metaphase I, anaphase I, and telophase I.. -Prophase I is the first phase in meiosis I.
Mitosis Essay Research Paper Mitosis is the
Mitosis Essay, Research Paper Mitosis is the process of asexual reproduction. Humans use meosis which is a process of sexual reproduction.Mitosis is the process of asexual reproduction. Humans use meosis which is a process of sexual reproduction.Mitosis is the process of asexual reproduction. Humans use meosis which is a process of sexual rMitosis is the process of asexual reproduction.
Clasical Conditioning Essay Research Paper Classical ConditioningWe
Clasical Conditioning Essay, Research Paper Classical Conditioning We can see learning taking place all the time, but there is no simple explanation of the process. Psychologists have examined four types of learning; one of these is classical conditioning or response learning. Classical conditioning is the easiest kind of learning.
Information Security Essay Research Paper Emerging Opportunities
Information Security Essay, Research Paper Emerging Opportunities and The Internet – Information Security by Margaret Headley “Using encryption on the Internet is the equivalent of arranging an armoured car to deliver credit card information from someone living in a cardboard box to someone living on a park bench.” Gene Spafford, computer security researcher, Purdue University.
Group Work Outline Essay Research Paper Group
Group Work Outline Essay, Research Paper Group Conflict Resolution Annotated Outline I. Introduction In this section, we will state our topic, which is group conflict resolution. We will present the subtopics we will focus on in the paper. We will briefly tie the four subtopics into each other under the umbrella topic of group conflict resolution.
Cell Mitosis Essay Research Paper The life
Cell Mitosis Essay, Research Paper The life Process of a cell In my report you will learn about the life process of a cell based on the two main functions, metabolism and mitosis. You will learn about the four stages of metabolism: ingestion, digestion, respiration, and excretion, and how the cell completes them.
Social Security Essay Research Paper Social securityThe
Social Security Essay, Research Paper Social security The issue I am addressing today is what to do about social security. There is going to be a large problem with our social security in years to come. Both Al Gore and Bush
Contrast Essay Research Paper The Perceptual ProcessThe
Contrast Essay, Research Paper The Perceptual Process The perceptual process can be very deceiving to some people, for example, take a deep woods country boy from Arkansas and put him in New York or Los Angeles , everything he may have been taught growing up is flying around in his head fast enough to make him dizzy.
Developing A Procedurally Essay Research Paper Developing
Developing A Procedurally Essay, Research Paper Developing a procedurally Just performance appraisal process When organizations make decisions about people, such as whom to hire or promote, appraisal ratings or merit raise to give, or how important that the decisions are seen as fair and just. Research has shown that at least two aspects of justice influence employees?? job satisfaction and organizational commitment and both must be considered in organization decisions.
Social Security
–Drawbacks Of Privitization Essay, Research Paper Federal emplyoment retirement fund Based on way budget defined… way to get 50% annual benefits for aging, because of including paying insurance into
Music 2
Music & Movies Essay, Research Paper Music & Movies This paper is based on what I know about music. Music is a way of life, and life would be a mistake without music. Music can encourage ones emotions, thoughts, and feelings.
Production Manufacturing Essay Research Paper Case Study
Production Manufacturing Essay, Research Paper Case Study 9 – “The Production Process at Washburn Guitars” There are many small manufacturing facilities in and near my city and town. Some of them would include The Washington Post, Berreta USA, and The Department of the Treasury, Bureau of Engraving and Printing.
Internet Security Basics Essay Research Paper The
Internet Security Basics Essay, Research Paper The introduction of the Internet into today?s business world has been both exciting and terrifying at the same time. What was once a matter of internal security controls and training has now become a complex process with numerous unknown variables and problems.
Social Security Essay Research Paper Will Social
Social Security Essay, Research Paper Will Social Security be here in the future Social Security is a system that was set up in 1935 after the Great depression to help people get through tough times. “Social Security is now used by nearly 44 million Americans”(policy). Only people who payed into social security are eligible to collect when they retire.
International Relations Realism Essay Research Paper In
International Relations: Realism Essay, Research Paper In the discipline of International Relations realism, which developed as a reaction to idealism during the Cold War, has become the dominant school of thought . Realism makes power the currency of international politics. Realist argue that by accumulating power states can ensure the security of the population within the state.
Julius Caesar 5 Essay Research Paper Julius
Julius Caesar 5 Essay, Research Paper Julius Caesar William Shakespeare s play, Julius Caesar, is mainly based on the assassination of Julius Caesar. The various men who happened to object to his assassination had different personal desires for their actions. Depending on each of their actions, words or even tone of voice they may misrepresent them and may be misinterpreted.
Fuel Cells Essay Research Paper Electricity is
Fuel Cells Essay, Research Paper Electricity is a vital part of in the present day economic based world and almost impossible to do with out in this modern age. Many problems arise over the most commonly used energy sources of today such as oil, coal and even the voltaic cells used as car batteries. These resources are often expensive and are not everlasting.