Given that the behavior blocker can intercept all such requests it can identify

Given that the behavior blocker can intercept all

This preview shows page 15 - 17 out of 18 pages.

make a well-defined request to the operating system. Given that the behavior blocker can intercept all
Image of page 15
such requests, it can identify and block malicious actions regardless of how obfuscated the program logic appears to be. The ability to watch software as it runs in real time clearly confers a huge benefit to the behavior blocker; however, it also has drawbacks. Since the malicious code must actually run on the target machine before all its behaviors can be identified, it can cause a great deal of harm to the system before it has been detected and blocked by the behavior blocking system. For instance, a new virus might shuffle a number of seemingly unimportant files around the hard drive before infecting a single file and being blocked. Even though the actual infection was blocked, the user may be unable to locate their files, causing a loss to productivity or possibly worse. b) List and briefly define the principal categories of SET participants. Further briefly define the sequence of events that are required for a transaction in a SET (Secure Electronic Transaction) environment.
Image of page 16
Image of page 17

You've reached the end of your free preview.

Want to read all 18 pages?

  • Summer '14
  • Key Length, cipher text

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture