Sensitive security points in PC microcomputers: understanding for building secure solutions to intrusions
暂无分享,去创建一个
The future of computer security is very dependent on the wild development of networking and microcomputing, and it is more and more difficult to protect microcomputers against enhanced piracy or "viruses". Also, a revision of such systems must be taken into consideration involving machines, operating systems, applications and data to avoid unauthorized access, abusive use of resources and losses of confidentiality, integrity and availability.Solutions need to be realistic to guarantee effective security. This involves mechanisms which are dependent on hardware and system software. MS-DOS components at work, boot, interrupts, DOS call functions are examined, and at the same time advanced "viruses" usages involving active and passive techniques, to suggest and evaluate possible solutions.A dual software examiner and security board solution is described. It does not necessitate modifying actual versions of the operating system, or applications in use, and new information about files can be stored in a secure way to avoid manipulation. Such a proposition can help to build security as a countermeasure to various intrusions, these from men, "viruses", worms and Trojan horses. It is better than any pure software solution which cannot guarantee overall security and especially in case of advanced "stealthy virus" attacks. It is possible to implement an intrusion detection model to predict future action from different intruders. This model has to support intuition exploration, and uncertainty or adaptative reasoning, working under control of a software security examiner which is itself under control of a hardware.
[1] Jan Hruska. Computer Viruses and Anti-Virus Warfare , 1993 .
[2] Harold Joseph Highland. Computer virus handbook , 1990, Computers and security.
[3] D. Guinier,et al. Biological versus computer viruses , 1989, SGSC.
[4] Daniel Guinier,et al. Prophylaxis for “virus” propagation and general computer security policy , 1991, SGSC.