UNIT 2 Notes CSS
UNIT 2 Notes CSS
Confinement Principle:
. The confinement principle is the principle of preventing a server from
leaking information that the user of the service considers confidential.
2. The confinement principle deals with preventing a process from taking
disallowed actions.
3. Consider a client/server situation: the client sends a data request to the
server; the server uses the data, performs some function, and sends the
results (data) back to the client.
4. In this case the confinement principle deals with preventing a server
from leaking information that the user of that service considers
confidential.
5. In confinement principle, access control affects the function of the
server in two ways:
A). Goal of service provider :
The server must ensure that the resources it accesses on behalf of the
client include only those resources that the client is authorized to access.
B). Goal of the service user: The server must ensure that it does not
reveal the client's data to any other entity vhich is not authorized to see
the client's data.
Process Control
File Management
Some common system calls are create, delete, read, write, reposition,
or close. Also, there is a need to determine the file attributes
– get and set file attribute. Many times the OS provides an API to make
these system calls.
Device Management
Information Management
Some system calls exist purely for transferring information between the
user program and the operating system. An example of this is time,
or date.
The OS also keeps information about all its processes and provides
system calls to report this information.
Communication
Israel Power Grid hit by a big hack attack is being called one of
the worst cyberattacks ever.
In 2014 a hydropower plant in upstate New York got hacked.
France in infrastructure including its main nuclear power plant is
being targeted by a new and dangerous powerful cyber worm.
Bangladesh's best group hacked into nearly 20000 Indian websites
including the Indian border security force.
First virus that could crash Power Grid or destroy the pipeline is
available online for anyone to download and Tinker with.
India’s biggest data breach, (the SBI debit card breach) when this
happened Bank was initially in a state of denial but subsequently
they had to own up the cyber security breach that took place in
Indian history.
VM based Isolation:
A VM is an isolated environment with access to a subset of physical
resources of the computer system. Each VM appears to be running on
the bare hardware, giving the appearance of multiple instances of the
same computer, though all are supported by a single physical system.
What is a rootkit?
Avast One knows how to remove rootkit viruses and prevent them from
coming back. So before a hacker can steal your data or gain privileged
access to your computer, let Avast scan and remove the malware for
good.
That's why a boot-time scan, like the one included in Avast One, is so
handy. Boot-time scans run during your computer’s startup procedure
and catch rootkits before they can act. The benefit of a boot-time scan is
that usually the rootkit will still be in a dormant state and unable to
conceal itself in your system.
Step 3: Reinstall OS
If antivirus software and a boot-time scan fail to remove the
rootkit, try backing up your data, wiping your device, and
performing a clean install. This is sometimes the only remedy
when a rootkit is operating at the boot, firmware, or hypervisor
level.
For starters, you need to know how to format a hard
drive and clone a hard drive to back up your important files.
You might need to wipe the main C: drive, but you can still keep
most of your data. This is the last resort to removing a rootkit.
Signs of a rootkit attack
The following warning signs may indicate the presence of a
rootkit on your device:
2. Anomaly-based Method:
Anomaly-based IDS was introduced to detect unknown
malware attacks as new malware are developed rapidly. In
anomaly-based IDS there is use of machine learning to create
a trustful activity model and anything coming is compared
with that model and it is declared suspicious if it is not found
in model. Machine learning-based method has a better-
generalized property in comparison to signature-based IDS as
these models can be trained according to the applications and
hardware configurations.