100%(1)1 out of 1 people found this document helpful
This preview shows page 15 - 17 out of 18 pages.
make a well-defined request to the operating system. Given that the behavior blocker can intercept all
such requests, it can identify and block malicious actions regardless of how obfuscated the program logic appears to be. The ability to watch software as it runs in real time clearly confers a huge benefit to the behavior blocker; however, it also has drawbacks. Since the malicious code must actually run on the target machine before all its behaviors can be identified, it can cause a great deal of harm to the system before it has been detected and blocked by the behavior blocking system. For instance, a new virus might shuffle a number of seemingly unimportant files around the hard drive before infecting a single file and being blocked. Even though the actual infection was blocked, the user may be unable to locate their files, causing a loss to productivity or possibly worse. b) List and briefly define the principal categories of SET participants. Further briefly define the sequence of events that are required for a transaction in a SET (Secure Electronic Transaction) environment.