You discover that your computing system has been infected by a piece of malicious code. You have no idea when the infection occurred. You do have backups performed every week since the system was put into operation but, of course, there have been numerous changes to the system over time. How could you use the backups to construct a “clean” version of your system?
What will be an ideal response?
Impossible way: Start from the beginning and rebuild from first backup, applying all changes in order.
Potentially feasible: Compare files of original backup with current files. Try to account for differences (new files, changed file sizes). Review all backups to determine when each file was changed or created. Note, this is also a very difficult task.
If the infection can be made to manifest itself (that is, if there is a test that will show the effect of the infection), start with backup 1, test, apply backup 2, test, … continue until test shows infection.
Note that none of these approachesare “easy.”
You might also like to view...
Answer the following statements true (T) or false (F)
1. "1st Place" < "2nd Place" 2. The second condition in cond1 OrElse cond2 is not evaluated when the first condition is false. 3. condition containing the keyword Or will always have the same truth value as the compound condition where Or is replaced with OrElse. 4. The second condition in cond1 AndAlso cond2 is not evaluated when the first condition is true. 5. The following two statements are equivalent. (T/F) Not (a < b) a > b
A hash function that satisfies the properties of variable input size, fixed output size, efficiency, preimage resistant and second preimage resistant is referred to as a __________.
A. strong hash function B. collision resistant function C. weak hash function D. preimage resistant function
will result in john getting an email containing the result of a lookup for Susan in the phonebook.
Add a -m command-line option to rolo to make it easy to look up someone and have the result emailed to the specified recipient. So rolo -m john Susan will result in john getting an email containing the result of a lookup for Susan in the phonebook.
The ____________________ effect is how rapidly objects appear to recede from or advance toward users for different values of z.
Fill in the blank(s) with the appropriate word(s).