You have been asked to perform a security audit on a computer system. The system administrator suspects that the pointer structure in the file system has been compromised, thus allowing certain unauthorized users to access critical system information. Describe how you would attempt to determine who is responsible for the security breach and how it was possible for them to modify the pointers.

What will be an ideal response?

This is a nontrivial task, but one that is receiving increasing attention in the literature
as more monumental security breaches occur. Intruders would tend to corrupt the pointer
structure for their own benefit and then disappear. More sophisticated breaches might
attempt to cover up the muddy footprints of the intrusion.The auditor might write a program
that would follow the modified pointers to their ultimate objects, and attempt to infer which
users would most want to corrupt the system to gain access to these objects.The point here is
that this is difficult to do, it may not be possible to recognize that the system has been corrupted
to begin with, and there is little guarantee that the auditor’s work will identify the miscreant.

Computer Science & Information Technology

You might also like to view...

SharePoint 2013 Online allows people in a business or enterprise to set up websites to share information, and publish and manage documents and reports

Indicate whether the statement is true or false

Computer Science & Information Technology

Spyware is another term for malicious software and refers to any computer program designed to surreptitiously enter a computer, gain unauthorized access to data, or disrupt normal processing operations.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology