Provide brief explanations or comments on the following
statements
Since exploits are often based on vulnerabilities inferred from
patches (such as Windows updates) we should refrain from publishing
patches.
Progress in technology (mobility, portable storage and devices,
etc.) has made it hard to define and defend network boundaries or
perimeters. This implies that we should apply “deperimeterization”
to our security designs and stop using perimeter protection systems
such as firewalls.
One-time-pads are proven to offer perfect secrecy therefore this
type of encryption is impossible to break.
Comment on the suggestion of using static associations to link
IP addresses to domain names to prevent “fake DNS” attacks (i.e.,
instead of hosts consulting the DNS for name resolution they would
use a local configuration file to resolve names into IP
addresses).
The Windows OS sets a trusted login path by asking users to
press a non-intercept-able key combination (control-alt-delete)
before logging in; this guarantees complete mediation (user is
typing to the OS not some malare).
Provide brief explanations or comments on the following statements Since exploits are often based on vulnerabilities inf
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am