You have been asked to perform a security audit on a computer system. The system administrator suspects that the pointer structure in the file system has been compromised, thus allowing certain unauthorized users to access critical system information. Describe how you would attempt to determine who is responsible for the security breach and how it was possible for them to modify the pointers.

What will be an ideal response?


This is a nontrivial task, but one that is receiving increasing attention in the literature
as more monumental security breaches occur. Intruders would tend to corrupt the pointer
structure for their own benefit and then disappear. More sophisticated breaches might
attempt to cover up the muddy footprints of the intrusion.The auditor might write a program
that would follow the modified pointers to their ultimate objects, and attempt to infer which
users would most want to corrupt the system to gain access to these objects.The point here is
that this is difficult to do, it may not be possible to recognize that the system has been corrupted
to begin with, and there is little guarantee that the auditor’s work will identify the miscreant.

Computer Science & Information Technology

You might also like to view...

What is the key capability of the web?

What will be an ideal response?

Computer Science & Information Technology

You can use the Windows 10 ________ accessibility app to enlarge a portion of the screen

Fill in the blank(s) with correct word

Computer Science & Information Technology

The method printf includes several format flags that support justification as well as other styles.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is an animation technique that uses a series of hand-drawn images?

A. Cel animation B. Frame-by-frame animation C. 3D animation D. Stop motion animation

Computer Science & Information Technology