SlideShare a Scribd company logo
1 of 9
Bacteria|Rabbit
•Computer program ,block of codes
•Replicates themselves
•Computers recourses like processor , memory
and disk space.
Ultimately result in dos
•Named for their similarity to
biological rabbits and bacteria
Defense method
• Sandboxing
• Proof carrying code
• Information flow matrices
• Reducing right
• Malicious logic alternating files
• Notion of trust
Sandboxing
• Creation of virtual environment
• Sandboxes, virtual machines also restrict
rights
– Modify program by inserting instructions to cause
traps when violation of policy
– feel safe & secure about what the executing
software can do.
Proof-Carrying Code
• originally described in 1996 by George
Necula and Peter Lee
• software mechanism for validating that allows a host
system to verify properties about an application
• Security policy to determine whether the application i
safe to execute
• Code consumer (user) specifies safety requirement
• Code producer (author) generates proof code meets this
requirement
– Proof integrated with executable code
– Changing the code invalidates proof
• code + proof delivered to consumer
• Consumer validates proof
Information flow metrics
• Propounded byHenry and Kafura
• Idea: limit distance a virus can spread
• transfer of information from a variable x to a variable
y in a given process
• Ensure confidentiality
• Metric associated with information, not objects
– You can tag files with metric, but how do you tag the information in
them?
– This prevent sharing
• To stop spread, make V = 0
– Disallows sharing
Reducing Protection Domain
• Application of principle of least privilege
• Basic idea: remove rights from process so it
can only perform its function
– Warning: if that function requires it to write, it can
write anything
– But you can make sure it writes only to those
objects you expect
Detect Alteration of Files
• developed by Silicon Graphics
• allows applications to watch certain files and be
notified when they are modified
• Compute manipulation detection code (MDC) to
generate signature block for each file, and save it
• Later, recompute MDC and compare to stored MDC
– If different, file has changed
Notion of trust
• Trust the user to take explicit actions to limit their
process’ protection domain sufficiently
• based on the authenticated identity of external
parties
• Rigid authentication mechanisms, such
as public key cryptographic and Kerberos to
protect users information.
• Types : Direct trust & Third Party Trust
Thank you!

More Related Content

What's hot

Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemMerlin Florrence
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsAya Mahmoud
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 
Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 
Deadlock in distribute system by saeed siddik
Deadlock in distribute system by saeed siddikDeadlock in distribute system by saeed siddik
Deadlock in distribute system by saeed siddikSaeed Siddik
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure callsAshish Kumar
 
Chapter 3 principles of parallel algorithm design
Chapter 3   principles of parallel algorithm designChapter 3   principles of parallel algorithm design
Chapter 3 principles of parallel algorithm designDenisAkbar1
 
Client Server Architecture in Software engineering
Client Server Architecture in Software engineeringClient Server Architecture in Software engineering
Client Server Architecture in Software engineeringpruthvi2898
 
Feng’s classification
Feng’s classificationFeng’s classification
Feng’s classificationNarayan Kandel
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemeswonloser
 
Basic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastBasic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastRashiJoshi11
 
fault-tolerance-slide.ppt
fault-tolerance-slide.pptfault-tolerance-slide.ppt
fault-tolerance-slide.pptShailendra61
 
Consensus Algorithms.pptx
Consensus Algorithms.pptxConsensus Algorithms.pptx
Consensus Algorithms.pptxRajapriya82
 
Data decomposition techniques
Data decomposition techniquesData decomposition techniques
Data decomposition techniquesMohamed Ramadan
 
Introduction to Electronic Commerce
Introduction to Electronic CommerceIntroduction to Electronic Commerce
Introduction to Electronic CommerceEr. Nawaraj Bhandari
 

What's hot (20)

Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
 
Inter-Process Communication in distributed systems
Inter-Process Communication in distributed systemsInter-Process Communication in distributed systems
Inter-Process Communication in distributed systems
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 
Intruders
IntrudersIntruders
Intruders
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
Deadlock in distribute system by saeed siddik
Deadlock in distribute system by saeed siddikDeadlock in distribute system by saeed siddik
Deadlock in distribute system by saeed siddik
 
Layered Architecture
Layered ArchitectureLayered Architecture
Layered Architecture
 
remote procedure calls
  remote procedure calls  remote procedure calls
remote procedure calls
 
Chapter 3 principles of parallel algorithm design
Chapter 3   principles of parallel algorithm designChapter 3   principles of parallel algorithm design
Chapter 3 principles of parallel algorithm design
 
Client Server Architecture in Software engineering
Client Server Architecture in Software engineeringClient Server Architecture in Software engineering
Client Server Architecture in Software engineering
 
Feng’s classification
Feng’s classificationFeng’s classification
Feng’s classification
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemes
 
Basic communication operations - One to all Broadcast
Basic communication operations - One to all BroadcastBasic communication operations - One to all Broadcast
Basic communication operations - One to all Broadcast
 
fault-tolerance-slide.ppt
fault-tolerance-slide.pptfault-tolerance-slide.ppt
fault-tolerance-slide.ppt
 
Consensus Algorithms.pptx
Consensus Algorithms.pptxConsensus Algorithms.pptx
Consensus Algorithms.pptx
 
Data decomposition techniques
Data decomposition techniquesData decomposition techniques
Data decomposition techniques
 
Introduction to Electronic Commerce
Introduction to Electronic CommerceIntroduction to Electronic Commerce
Introduction to Electronic Commerce
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 

Viewers also liked

performance evaluation of empployees
performance evaluation of empployeesperformance evaluation of empployees
performance evaluation of empployeessabin kafle
 
Managerial economics
Managerial economicsManagerial economics
Managerial economicsho58
 
Examples CSS HTML
Examples CSS HTMLExamples CSS HTML
Examples CSS HTMLRaul Raul
 
Photo talk azham bin aziz
Photo talk azham bin azizPhoto talk azham bin aziz
Photo talk azham bin azizAzham Aziz
 
Laboratorium al qur'an hadis.
Laboratorium al qur'an hadis.Laboratorium al qur'an hadis.
Laboratorium al qur'an hadis.sitialfaizah
 
Membuat bahan ajar dengan articulate
Membuat bahan ajar dengan articulateMembuat bahan ajar dengan articulate
Membuat bahan ajar dengan articulateBambang Soegiharto
 
Introduction to web surfer communication
Introduction to web surfer communicationIntroduction to web surfer communication
Introduction to web surfer communicationsabin kafle
 
hospital management System
hospital management Systemhospital management System
hospital management Systemsabin kafle
 
Copyrights and trademarks
Copyrights and trademarksCopyrights and trademarks
Copyrights and trademarkssabin kafle
 
Membuat animasi pembuka pada power point
Membuat animasi pembuka pada power pointMembuat animasi pembuka pada power point
Membuat animasi pembuka pada power pointBambang Soegiharto
 

Viewers also liked (17)

performance evaluation of empployees
performance evaluation of empployeesperformance evaluation of empployees
performance evaluation of empployees
 
Managerial economics
Managerial economicsManagerial economics
Managerial economics
 
Examples CSS HTML
Examples CSS HTMLExamples CSS HTML
Examples CSS HTML
 
Amal yang diterima
Amal yang diterimaAmal yang diterima
Amal yang diterima
 
Photo talk azham bin aziz
Photo talk azham bin azizPhoto talk azham bin aziz
Photo talk azham bin aziz
 
Laboratorium al qur'an hadis.
Laboratorium al qur'an hadis.Laboratorium al qur'an hadis.
Laboratorium al qur'an hadis.
 
Shalat
ShalatShalat
Shalat
 
Membuat bahan ajar dengan articulate
Membuat bahan ajar dengan articulateMembuat bahan ajar dengan articulate
Membuat bahan ajar dengan articulate
 
Articulate quizmaker’13
Articulate quizmaker’13Articulate quizmaker’13
Articulate quizmaker’13
 
Introduction to web surfer communication
Introduction to web surfer communicationIntroduction to web surfer communication
Introduction to web surfer communication
 
Kurikulum 2013
Kurikulum 2013Kurikulum 2013
Kurikulum 2013
 
Hidup seperti buku
Hidup seperti bukuHidup seperti buku
Hidup seperti buku
 
hospital management System
hospital management Systemhospital management System
hospital management System
 
Copyrights and trademarks
Copyrights and trademarksCopyrights and trademarks
Copyrights and trademarks
 
SAARC
SAARCSAARC
SAARC
 
Membuat bahan ajar dari ppt
Membuat bahan ajar dari ppt Membuat bahan ajar dari ppt
Membuat bahan ajar dari ppt
 
Membuat animasi pembuka pada power point
Membuat animasi pembuka pada power pointMembuat animasi pembuka pada power point
Membuat animasi pembuka pada power point
 

Similar to Raabit and bacteria

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2Ankit Gupta
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB
 
Hacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Reverse Engineering the Android OSHacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Reverse Engineering the Android OSEC-Council
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoTPaul Fremantle
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksSecurity Bootcamp
 
The Trouble with Cloud Forensics
The Trouble with Cloud ForensicsThe Trouble with Cloud Forensics
The Trouble with Cloud ForensicsSharique Rizvi
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentityFredBrandonAuthorMCP
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 

Similar to Raabit and bacteria (20)

Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
MongoDB.local Sydney: The Changing Face of Data Privacy & Ethics, and How Mon...
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Hacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Reverse Engineering the Android OSHacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Reverse Engineering the Android OS
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
Security issues in cloud database
Security  issues  in cloud   database Security  issues  in cloud   database
Security issues in cloud database
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
The Trouble with Cloud Forensics
The Trouble with Cloud ForensicsThe Trouble with Cloud Forensics
The Trouble with Cloud Forensics
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
SC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and IdentitySC-900 Concepts of Security, Compliance, and Identity
SC-900 Concepts of Security, Compliance, and Identity
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Cloud slide
Cloud slideCloud slide
Cloud slide
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 

More from sabin kafle

Unit 7 leadership
Unit 7 leadershipUnit 7 leadership
Unit 7 leadershipsabin kafle
 
Unit 8 communication
Unit  8  communicationUnit  8  communication
Unit 8 communicationsabin kafle
 
Understanding individual behaviour
Understanding individual behaviourUnderstanding individual behaviour
Understanding individual behavioursabin kafle
 
Total quality-system
Total quality-systemTotal quality-system
Total quality-systemsabin kafle
 
Production system in ai
Production system in aiProduction system in ai
Production system in aisabin kafle
 
Organizational Development
Organizational DevelopmentOrganizational Development
Organizational Developmentsabin kafle
 
Linear programming
Linear programmingLinear programming
Linear programmingsabin kafle
 
analysis and design with uml
analysis and design with umlanalysis and design with uml
analysis and design with umlsabin kafle
 
Aggregate planning
Aggregate planningAggregate planning
Aggregate planningsabin kafle
 
Merger and aquisition
Merger and aquisitionMerger and aquisition
Merger and aquisitionsabin kafle
 
Staff use-of-internet
Staff use-of-internetStaff use-of-internet
Staff use-of-internetsabin kafle
 
Objectives of foreign direct investment
Objectives of foreign direct investmentObjectives of foreign direct investment
Objectives of foreign direct investmentsabin kafle
 
Dark sides of social networking
Dark sides of social networkingDark sides of social networking
Dark sides of social networkingsabin kafle
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligencesabin kafle
 
storage devices and its types
 storage devices and its types storage devices and its types
storage devices and its typessabin kafle
 

More from sabin kafle (19)

Unit 7 leadership
Unit 7 leadershipUnit 7 leadership
Unit 7 leadership
 
Unit 8 communication
Unit  8  communicationUnit  8  communication
Unit 8 communication
 
Understanding individual behaviour
Understanding individual behaviourUnderstanding individual behaviour
Understanding individual behaviour
 
Total quality-system
Total quality-systemTotal quality-system
Total quality-system
 
Production system in ai
Production system in aiProduction system in ai
Production system in ai
 
Perception
PerceptionPerception
Perception
 
Organizational Development
Organizational DevelopmentOrganizational Development
Organizational Development
 
Linear programming
Linear programmingLinear programming
Linear programming
 
analysis and design with uml
analysis and design with umlanalysis and design with uml
analysis and design with uml
 
Bcg matrix
Bcg matrixBcg matrix
Bcg matrix
 
Aggregate planning
Aggregate planningAggregate planning
Aggregate planning
 
Merger and aquisition
Merger and aquisitionMerger and aquisition
Merger and aquisition
 
Staff use-of-internet
Staff use-of-internetStaff use-of-internet
Staff use-of-internet
 
Websurfer
WebsurferWebsurfer
Websurfer
 
Objectives of foreign direct investment
Objectives of foreign direct investmentObjectives of foreign direct investment
Objectives of foreign direct investment
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Dark sides of social networking
Dark sides of social networkingDark sides of social networking
Dark sides of social networking
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
storage devices and its types
 storage devices and its types storage devices and its types
storage devices and its types
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Raabit and bacteria

  • 1. Bacteria|Rabbit •Computer program ,block of codes •Replicates themselves •Computers recourses like processor , memory and disk space. Ultimately result in dos •Named for their similarity to biological rabbits and bacteria
  • 2. Defense method • Sandboxing • Proof carrying code • Information flow matrices • Reducing right • Malicious logic alternating files • Notion of trust
  • 3. Sandboxing • Creation of virtual environment • Sandboxes, virtual machines also restrict rights – Modify program by inserting instructions to cause traps when violation of policy – feel safe & secure about what the executing software can do.
  • 4. Proof-Carrying Code • originally described in 1996 by George Necula and Peter Lee • software mechanism for validating that allows a host system to verify properties about an application • Security policy to determine whether the application i safe to execute • Code consumer (user) specifies safety requirement • Code producer (author) generates proof code meets this requirement – Proof integrated with executable code – Changing the code invalidates proof • code + proof delivered to consumer • Consumer validates proof
  • 5. Information flow metrics • Propounded byHenry and Kafura • Idea: limit distance a virus can spread • transfer of information from a variable x to a variable y in a given process • Ensure confidentiality • Metric associated with information, not objects – You can tag files with metric, but how do you tag the information in them? – This prevent sharing • To stop spread, make V = 0 – Disallows sharing
  • 6. Reducing Protection Domain • Application of principle of least privilege • Basic idea: remove rights from process so it can only perform its function – Warning: if that function requires it to write, it can write anything – But you can make sure it writes only to those objects you expect
  • 7. Detect Alteration of Files • developed by Silicon Graphics • allows applications to watch certain files and be notified when they are modified • Compute manipulation detection code (MDC) to generate signature block for each file, and save it • Later, recompute MDC and compare to stored MDC – If different, file has changed
  • 8. Notion of trust • Trust the user to take explicit actions to limit their process’ protection domain sufficiently • based on the authenticated identity of external parties • Rigid authentication mechanisms, such as public key cryptographic and Kerberos to protect users information. • Types : Direct trust & Third Party Trust