100%(6)6 out of 6 people found this document helpful
This preview shows page 16 - 18 out of 24 pages.
Memory Buffer Overflow is the process of storing more information within a memory structure than designed. This can lead to unintended results, often the ability to inject malicious code that once again may grant elevated access. A mechanism to stop these attacks is run-time is to use Address Space Randomization. ASR randomizes where in memory processes can run, making exponentially more difficult for an attacker to predict where in the memory stack that information will be written (Stallings (n.d.), Operating Systems: Internals and Design Principles). By randomizing the location, it increases the difficulty of determining the memory location which in turn makes it difficult to inject code that will be executable outside of the confined parameters. The third area to verify is Data Backup.Ensuring that valuable data can be restored in the event of a compromise or disaster is just as important as securing the data in the first place. Without the ability to recover damaged data, it cannot be fully secured and reliability cannot be ensured. Implementing a proper data backup system offers security in knowing that in the event of a security or natural disaster incident, data can be recovered and restored (Stallings, n.d., Operating Systems: Internals and
Operating Systems Design17Design Principles). Ideally data will be securely backed up to an off-site location where it is transmitted and stored fully encrypted. This ensure data integrity and confidentiality. Having multiple restore points allows for the restoration of compromised data even if it is not noticed immediately. A secondary part of an appropriate backup solution is to regularly verify that the data stored on the backup is in fact good and a complete restoration can be executed. Without theability to restore data, backing it up does the organization no good. A quality restoration plan should require that data be restored quickly and accurately. At USD253 we must be cognizant of all potential security issues that could compromise our deployment of Windows 10 systems. Several are universal to computing in general, but all apply to our deployment. Social Engineering, Web Threats, OS Exploitation, Software Exploitation, Network Security are just a few of the areas that will be evaluated regularly to ensure system integrity at USD253.Social EngineeringSocial Engineering has become the largest area of growth in Cyber Crimes. It preys upon the most vulnerable component of any computer system, the user. The ability to trick the user into giving up confidential information or installing a malicious application is still one of the easiest attacks to accomplish. This is usually accomplished by confusing or scaring a user into believing that they have done something wrong or can gain something lucrative very easily. The best way to mitigate this attack vector is through relentless education of the user. Keeping them informed that the IT department at USD253 will never ask for credentials over email as well as educating them what fake emails look like when attempting to gather information from the user.