Question

In: Accounting

Make recommendations for the optimal computer operating system to address the emerging issue.

Make recommendations for the optimal computer operating system to address the emerging issue.

Solutions

Expert Solution

The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched. So it's important to be aware of the threats to enterprise security that are coming over the horizon and heading this way.

It's a question the Georgia Institute of Technology addresses in its Emerging Cyber Threat Report 2013, in which researchers identify at least six threats that all security professionals should know about.

Using DRM-like Tech to Hide Viruses

Some music and ebooks files are protected by digital rights management (DRM) systems. These files are effectively locked to particular devices so that they can only be played on these devices and can't be copied and shared.

Malware can use the same technique. Essentially it locks itself to a particular system by encrypting portions of its binary using specific attributes of the infected system to generate a key. That means that once it has infected a system, the malware will only run on that machine and can't be copied and run on another.

The purpose of this is to make it much harder for anti-virus vendors to take a sample of the code from an infected machine and run it in their own systems - to analyze it and, ultimately, produce an anti-virus signature for it. Virus authors such as those behind the Gauss Trojan, which was discovered in August 2012, and the Flashback Trojan in 2011 have already used this self-defense technique, and it's one that's likely to become common in the future, the report suggests.

What you can do to mitigate the threat: Enterprises should deploy anti-virus products which offer effective alternatives to signature-based protection such as behavioral protection and file reputation based systems.

Targeting OS X

In the past most malware writers have targeted systems running Microsoft's Windows operating system. This has led many Mac users to believe falsely that OS X is a highly secure operating system that can't be compromised. As a result, most computers running the operating system have little or no anti-malware protection.

But the Flashback Trojan demonstrated that machines running Apple's OS X operating system are also now being targeted, and that they are vulnerable.

Aside from vulnerabilities in the operating system, which Apple is often slow to patch, malware writers are also exploiting vulnerabilities in software such Java, which run on these systems. Flashback infected over 600,000 systems running OS X. The report predicts that because most OS X systems have little or no protection and the user base is inexperienced with security, it will increasingly be targeted by attackers in the future.

What you can do to mitigate the threat: Devices running OS X should be protected by the same security measures as Windows machines. That means installing anti-virus software, and ensuring that the operating system and third-party software such as Java is updated with security patches as soon as they are available.

Malicious Hardware/Supply Chain Insecurities

The threat here is that networking hardware made by Chinese companies such as Huawei and ZTE, or counterfeit hardware made in China or elsewhere, may contain malicious hardware or firmware code which provides a backdoor into corporate systems. This has always been a possibility, but in October 2012 the House Select Committee on Intelligence explicitly recommended that private sector entities consider "the long-term security risks associated with doing business with either ZTE or Huawei for equipment or services."

What you can do to mitigate the threat: At the very least, limit networking hardware purchases to trusted vendors. Additional measures include carrying out network listening to detect hardware acting maliciously, and carrying out random tests on devices to look for indications that they contain extra components or malicious firmware. At the highest level, some companies may choose to assume that all hardware


Related Solutions

What strategic recommendations can you make to chipotle to address their issues and enhance their strategy
What strategic recommendations can you make to chipotle to address their issues and enhance their strategy
Make recommendations for how the issue of racial profiling could be addressed in order to minimize...
Make recommendations for how the issue of racial profiling could be addressed in order to minimize its impact on the target population. Think of specific strategies or tactics that you could implement to address the issue.
What Management, Marketing, Finance/Accounting, R&D and CIS issue, if any you foresee. Your recommendations to address...
What Management, Marketing, Finance/Accounting, R&D and CIS issue, if any you foresee. Your recommendations to address them. Recommend procedures you�ll have in place for strategy review, evaluation and control specific to your business entity.
Consider a computer system with a 64-bit logical address and 8-KB page size. The system supports...
Consider a computer system with a 64-bit logical address and 8-KB page size. The system supports up to 1024 MB of physical memory: How many entries are there in each of the following in the page table? Describe how a logical address may be used to obtain the frame number. You may use the virtual address 14533956 to illustrate your answer. make it short and clear , please type in your keyboard.
1)Make recommendations in order to establish a strong internal control system for the payroll process of...
1)Make recommendations in order to establish a strong internal control system for the payroll process of Mulgoviey Story Cut Farming Company
Identify a health issue in North carolina and discuss a system level advocacy strategy to address...
Identify a health issue in North carolina and discuss a system level advocacy strategy to address the concern. Identify specified groups or individuals they would target.
"Operating and Capital Leases" Discuss recommendations you would make to chief financial officers (CFOs) of retailers,...
"Operating and Capital Leases" Discuss recommendations you would make to chief financial officers (CFOs) of retailers, service providers, and other businesses that lease several locations or have substantial leases of real estate or other assets. Indicate the pros and cons of each approach. Is leasing a better option that buying/selling? Discuss the advantages and the disadvantages of leasing for a lessee. Discuss the advantages and the disadvantages of leasing for a lessor
How are address, data and control signals connected to the various components within the computer system?
How are address, data and control signals connected to the various components within the computer system?
Explain how an operating system protects main memory in a computer system. Discuss three responsibilities that...
Explain how an operating system protects main memory in a computer system. Discuss three responsibilities that an operating system has for file management in a computer system. Clearly distinguish between interrupt and trap. Give examples to illustrate your answer. Describe time-sharing systems and give an example to illustrate your answer. Discuss the 4 categories in which work concerning information security and protection relating to Operating Systems are grouped.
A computer system administrator notices that computers running a particular operating system seem to freeze up...
A computer system administrator notices that computers running a particular operating system seem to freeze up more often as the installation of the operating system ages. She measures the time (in minutes) before freeze-up for seven computers one month after installation, and for nine computers seven months after installation. The results are as follows: One month after install: 207.4 233.1 215.9 235.1 225.6 244.4 245.3 Seven months after install: 84.3 53.2 127.3 201.3 174.2 246.2 149.4 156.4 102.3 Let μX...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT