StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Buffer Overflow & Rootkits - Assignment Example

Cite this document
Summary
Most people’s computers become the victims of these attacks because of the lack of enquired protection. The reason is the lack of awareness of the existence of protective programs that might avert…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
Buffer Overflow & Rootkits
Read Text Preview

Extract of sample "Buffer Overflow & Rootkits"

Buffer Overflow & Rootkits al Affiliation Buffer Overflow & Rootkits Computer systems are vulnerable to attacks by a variety of on the internet. Most people’s computers become the victims of these attacks because of the lack of enquired protection. The reason is the lack of awareness of the existence of protective programs that might avert these attacks. Other individuals are just ignorant that such attacks even take place in the first place and, therefore, see no reason to install protective software (Ben-shalom, Naystut & Muttik, 2015).

Perhaps, this is due to the nature of some attacks to integrate themselves well into the computer’s operating system. Another reason is the failure of individuals to update their existing protections that render them non-functional.Someone can design a program that can detect a rootkit. A rootkit describes stealthy software that makes it hard to detect the existence of certain programs in a computer. Therefore, to detect one, someone needs to use an alternative and trusted operating system.

Designing programs constituting such operating systems would make it possible to detect rootkits. Other ways include signature scanning, difference scanning, behavioural-based methods and memory dump analysis.The behavioural-based approach depends on the fact that rootkits behave in a way different from other programmes (Pleeger, 2012). In signature scanning, an antivirus will detect any stealthy measures that a rootkit might adopt to unload itself or prevent its detection. The difference-based scanning method compares trusted original data from the computer with defective data returning from the API (Application programming interface), a programme building tool.

Memory dumping involves dumping of virtual memory, which can then be forensically analysed to capture an active rootkit with a tool called a debugger. It prevents the rootkit from taking any measures to hide itself. However, the overall detection of a rootkit depends on its sophistication.ReferencesBen-shalom, O., Naystut, A. & Muttik, I. (2015). U.S. Patent No. 20,150,007,316. Washington, DC: U.S. Patent and Trademark OfficePleeger, C. (2012). Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach.

New York: Prentice Hall-Pearson Publication.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1680095-buffer-overflow-rootkits
(Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 Words)
Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1680095-buffer-overflow-rootkits.
“Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1680095-buffer-overflow-rootkits.
  • Cited: 0 times

CHECK THESE SAMPLES OF Buffer Overflow & Rootkits

Malicious Software, Unknown Threats and Potential Solutions

This paper ''Malicious Software, Unknown Threats and Potential Solutions'' discusses that malicious software consists of code, scripts, and active contents that are designed to disrupt and deny proper operations of information systems.... nbsp;… Malicious software also gathers unauthorized information, thus leading to loss of privacy and confidentiality of information....
6 Pages (1500 words) Research Paper

Use of BOTNET in Server Service Attacks

Apart from IRC, hackers utilize rootkits to compromise weak system with no updated security patches and have security loop holes that facilitate hacker's objectives.... This short burst artifice the TCP that the data stream is congestion and buffer of the targeted router overflows that result in packet drops (Ghazali & Hassan, 2011)....
3 Pages (750 words) Essay

Intrusion Prevention and Detection: Securing Information

It presents innovative procedure for management of capabilities that jointly offer an efficient and non-intrusive prevention solution to prevent threats like that buffer overflow attacks as well as Trojan horse attacks.... Symantec Host IDS improves the safety of critical server platforms all through the business by offering real-time intrusion detection as well as new proactive intrusion hindrance....
2 Pages (500 words) Essay

Database security issues

Databases having become more critical in the delivery of the enterprise promise.... However, with the growth in database systems' demand, security issues concerning the safety of… This paper seeks to discuss some of the database security issues that are threaten to compromise the information stored by organizations....
5 Pages (1250 words) Research Paper

Rootkits, Computer Attacks and Cybercrime

rootkits are considered to be among the initial endeavors by hackers and intruders to gain access of systems.... Koch (2007) stated… Casad (2006) stated that it was a set of tools that could be uploaded in the computer under attack; the tools enabled the intruder to perform malicious activities rootkits rootkits Introduction Computer attacks and cybercrime has been present in the world of computing in one form or the other since the emergence of the invention of computers....
2 Pages (500 words) Research Paper

Injection attacks

Injection attacks refer to the introduction of malicious codes or scripts into a program or web application from an external source (Patel, Mohammed & Soni, 2011).... An example includes an input field provided by web application to gather input from an end-user. Kolhe and… (2014) define SQL injection as a code injection attack involving the insertion of malicious SQL statements into an entry field for subsequent execution so as to attack the database and perform varied forms of database operations, interactions and functions without the This SQL injection would fool the database to be a regular user query and then easily access the system....
3 Pages (750 words) Research Paper

Buffers and Buffer Capacity

Similarly, a buffer is a mixture of molecules releasing or binding H+ so as to maintain a moderately stable pH.... The function of a buffer is to minimize the change in… There are several types of buffers and each particular buffer only stabilizes the pH of a solution within a particular range.... One buffer might be operative within a range of pH 2 to pH 6, whereas another might be operative within a Afar its buffering range, a buffer does not act to stabilize the pH of the solution (Phadungchewit, 13)....
4 Pages (1000 words) Essay

Stack and Buffer Attacks in Operating Systems

This essay "Stack and Buffer Attacks in Operating Systems" states that administrators can avoid buffer overflows by taking their time in considering the buffer size and avoid buffer overflow.... buffer overflow vulnerability gives an attacker the option to generate and run a code; the code then attacks the vulnerable application allowing the user to define the term of bias on the application giving an attacker the option to control a system (Crispin Cowan 1999)The first buffer attack was widely used by the Morris Worm in the year 1988....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us