Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Malicious code

TIT - deals with software (flaws, malicious codes, etc.) and hardware (failures, power disruption, tampering, line tapping, electromagnetic emanation, etc.) aspects,... [Pg.10]

III Detection and prevention controls to protect against malicious code are implemented. C [6 5]... [Pg.1878]

Malicious Code/Programs (Amoroso, 1994 NIST, 1997 CyberProtect, 1999 NSW Guideline, 2003) Viruses and Worm (Loch Carr, 1992 Landwehr et al., 1994 Icove et al., 1995 Cohen, 1997 CyberProtect,... [Pg.150]

As depicted in Figure 2, at a broad level, IT security and the supply chain share the same sources of risk organizational, network, or en-virorunental. Viruses and malicious programs, for instance, often stem from envirorunental risk from the far reaches of the Internet however, because supply chain partners t5q)ically maintain high intercormectivity to support collaboration, we have found malicious code to be a substantial network risk as well. This was apparent from... [Pg.153]

Malicious Code Programs Malicious code or program infection 70.9%... [Pg.157]

It is not the intent of this chapter to provide technical instructions for developing a cyber-safe environment in schools. Aspects such as firewalls, malicious code, and access controls need to be addressed by network administrators who can configure those protection systems properly. However, it is proposed that this chapter enlighten educators with a knowledge base that will allow them to understand the various factors that construct the school s cyber environment, so they can articulate an approach reducing a school s cyber risks. Minimizing cyber risks in schools can be best addressed by making educators aware of their role in the process. Because of schools and educators place in the lives of children, it is imperative that cyber safety be a portion of the educational process. [Pg.61]

Threats to digital information are viruses, malware, exploited vulnerabilities, remote access, mobile devices, social networks, and cloud computing. Viruses and malware can render information useless. Most active computer users have fallen prey to viruses and malware that damage and destroy information. Viruses are malicious codes that cause an infected computer to spread the virus to other associated computers via the network or e-mail contact lists. Malware may be destructive or disruptive in nature but will not have the inherent ability to spread itself. Although you may get a malware infection by visiting a website that hosts the malware, it is not actually a virus unless it utilizes your contact list or network directory services to propagate itself. A malware- or virus-infected machine or network can make a school s information useless (National Center for Education Statistics, n.d.). [Pg.78]

Abstract. The trend to compose real time systems with standard IT known from conventional office domains results in heterogeneous technical environments. Examples are modern industrial process automation networks. It is a challenging task, because of potential impacts of security incidents to the system safety. For example, robot control rmits could be manipulated by malicious codes. The term risk communication is introduced, to describe alarm communication in hmnan-machine interaction scenarios. User adapted risk communication between humans and industrial automation systems, including home robotics, can prevent hazards and/or threats to the entire system safety and security. Current safety and security risk communication standards are compared to examine the adequacy for our uniform approach. This paper focuses on alarm system standards in the industrial process automation domain and intrusion detection systems from the conventional desktop IT domain. A uniform model based approach for risk communication in distributed IT enviromnents is introduced. [Pg.289]

Malicious logic or malicious codes are software programs written by attackers to realise automated attacks on computer systems [9]. Examples are computer viruses, worms, and TVolan horses. [Pg.290]

The mechanism of malicious activity is not well known. The literature available to the authors do not describe the exact mechanisms of malicious code. One of the possible reasons is that the analysis of malicious code operation requires a lot of technical knowledge. The specialized software is necessary to test malicious behaviour. It is difficult to examine the structure and behaviour of malicious codes. Some of them have a built-in selfprotection mechanism against the software structure and behaviour analysis. [Pg.652]

We are currently investigating other experiments. The first one consists in abusing the update of data in the flash of the P4080. Thus process is performed thanks to the cooperation between two user applications. We plan to check whether the corruption of one of these applications could provoke the flashing of purposely corrupted data. A second attack consists in using a core to execute malicious code. Actually, only one core is currently used in our experimental platform but we want to test the level of difficulty that is required to activate... [Pg.152]

It is important to appreciate that some data may be transient and will never be stored to durable media, while other transient data may be processed to derive data before being stored. Both transient and stored data must be protected from unauthorized, inadvertent, or malicious modification. It is expected that a register of authorized users, identification codes, and scope of authority of individuals to input or change data is maintained. Some computer systems lock-down data, denying all write-access. Secnrity arrangement is discussed in detail elsewhere in this chapter. [Pg.295]

Trojan Horse FDA (1995) A method of attacking a computer system, typically by providing a useful program that contains code intended to compromise a computer system by secretly providing for unauthorized access, the unauthorized collection of privileged system and user data, the unauthorized reading or altering of hies, the performance of unintended and unexpected funchons, or the malicious destruction of software and hardware. [Pg.948]

In this section of the report, we define an information hiding system with a non-malicious attack channel. We cite information-theoretic results pertaining to the related problem of coding for a communication channel with side information, and describe the equivalent results for information hiding systems with mean distortion constraint, established lately in the literature. Similar and somewhat stronger results for information hiding systems with distortion constraints based on maximum distortion measures, are then presented, while their proofs are deferred to the appendices. This body of theoretical results provides the foundation for the more practical analysis in the subsequent sections. [Pg.4]

Every chapter of the Code is divided in overall 39 subchapters, whereby each subsection starts with an Objective , e.g. 10 Communications and operations management —10.4 Protection against malicious and mobile code, whereby, mobile code is defined in IS as a program code which can migrate from one computer to another in a network , e.g. applets (Darrel 2001). [Pg.1877]

Table 3. Ranking of measurements of objective 10.4 protection against malicious and mobile code . [Pg.1878]

Finally, the SBP of Objective 10.4 are defined as The integrity of software and information against malicious and mobile code is protected by I awareness means - II code configuration means - III detection means - IV execution prevention means - V recovery means. [Pg.1882]

Bouffard et al. described in [13], two methods to change the control flow graph of a Java Card. The first one is Eman 2, which provides a way to change the return address of the current function. This information is stored in the Java Card stack header. Once the malicious function exits during the correct execution, the program counter returns to the instruction which addresses it. The address of the jpg is also stored in the Java Card Stack header. An overflow attack success to change the return address by the address of the malicious byte code. Since there is no runtime check on the parameter, it allows a standard buffer overflow attack to modify the frame header. [Pg.88]


See other pages where Malicious code is mentioned: [Pg.1918]    [Pg.1919]    [Pg.1920]    [Pg.150]    [Pg.153]    [Pg.156]    [Pg.843]    [Pg.290]    [Pg.156]    [Pg.80]    [Pg.153]    [Pg.1918]    [Pg.1919]    [Pg.1920]    [Pg.150]    [Pg.153]    [Pg.156]    [Pg.843]    [Pg.290]    [Pg.156]    [Pg.80]    [Pg.153]    [Pg.227]    [Pg.620]    [Pg.1]    [Pg.12]    [Pg.113]    [Pg.200]    [Pg.1881]    [Pg.53]    [Pg.1792]    [Pg.77]    [Pg.84]   
See also in sourсe #XX -- [ Pg.149 ]




SEARCH



Malicious

© 2024 chempedia.info