Free

Buffer Overflow & Rootkits - Assignment Example

Comments (0) Cite this document
Summary
Most people’s computers become the victims of these attacks because of the lack of enquired protection. The reason is the lack of awareness of the existence of protective programs that might avert…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Buffer Overflow & Rootkits
Read TextPreview

Extract of sample "Buffer Overflow & Rootkits"

Buffer Overflow & Rootkits al Affiliation Buffer Overflow & Rootkits Computer systems are vulnerable to attacks by a variety of on the internet. Most people’s computers become the victims of these attacks because of the lack of enquired protection. The reason is the lack of awareness of the existence of protective programs that might avert these attacks. Other individuals are just ignorant that such attacks even take place in the first place and, therefore, see no reason to install protective software (Ben-shalom, Naystut & Muttik, 2015). Perhaps, this is due to the nature of some attacks to integrate themselves well into the computer’s operating system. Another reason is the failure of individuals to update their existing protections that render them non-functional.
Someone can design a program that can detect a rootkit. A rootkit describes stealthy software that makes it hard to detect the existence of certain programs in a computer. Therefore, to detect one, someone needs to use an alternative and trusted operating system. Designing programs constituting such operating systems would make it possible to detect rootkits. Other ways include signature scanning, difference scanning, behavioural-based methods and memory dump analysis.
The behavioural-based approach depends on the fact that rootkits behave in a way different from other programmes (Pleeger, 2012). In signature scanning, an antivirus will detect any stealthy measures that a rootkit might adopt to unload itself or prevent its detection. The difference-based scanning method compares trusted original data from the computer with defective data returning from the API (Application programming interface), a programme building tool. Memory dumping involves dumping of virtual memory, which can then be forensically analysed to capture an active rootkit with a tool called a debugger. It prevents the rootkit from taking any measures to hide itself. However, the overall detection of a rootkit depends on its sophistication.
References
Ben-shalom, O., Naystut, A. & Muttik, I. (2015). U.S. Patent No. 20,150,007,316. Washington, DC: U.S. Patent and Trademark Office
Pleeger, C. (2012). Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach. New York: Prentice Hall-Pearson Publication. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1680095-buffer-overflow-rootkits
(Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 Words)
Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1680095-buffer-overflow-rootkits.
“Buffer Overflow & Rootkits Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1680095-buffer-overflow-rootkits.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Buffer Overflow & Rootkits

E-crime investigation. Security breach on a Linux Operation System

...? Table of Contents Investigation ------------------------------- Page 2-9 Answers ------------------------------- Page 9-10 Prevention ------------------------------- Page 10 Mitigation ------------------------------- Page 10-13 Conclusion ------------------------------- Page 13 References ------------------------------- Page 14 Investigation Andy found concrete evidence from the deleted log file entry on Stilianos system that was initially compromised on 18th September Sep 18 02:42:54 victim rpc.statd[349]: gethostbyname error for ^X[buffer overrun shell code removed]. Likewise, the system was than targeted by ‘rpc.statd’ overflow. Secondly, Andy investigated the MAC times of some important files. On...
12 Pages(3000 words)Assignment

Do not need to divide it

...CVE-2003-0352/MS03-026 Introduction The aim of the report is to examine the common vulnerability that was exposed in 2003 in Microsoft Windows Operating system. Common Vulnerabilities and Exposures (CVE) provides the common vulnerabilities that affect a system. A system is generally more prone to security threats and attacks. CVE provides a list of vulnerabilities that usually target a network system. The common vulnerability that is discussed here is CVE-2003-0352, called as the RPC DCOM Vulnerability. Its description states that it is a “Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a...
13 Pages(3250 words)Coursework

The Art of Cooking Rice

4 Pages(1000 words)Assignment

Practical UNIX Security

...permits unauthorized confession of data. In addition, the impact includes unauthorized modification along with disruption of services (, National Vulnerability Database (NVD) National Vulnerability Database (CVE-2010-3872)). The platforms that are vulnerable to this threat are Apache HTTP Server 2.0, Apache HTTP Server 2.2, Apache Software Foundation mod_fcgid 2.3. Furthermore, the products that are vulnerable to this threat are as follows (, Apache 'mod_fcgid' Module Unspecified Stack Buffer Overflow Vulnerability): Red Hat Fedora 14 Red Hat Fedora 13 Red Hat Fedora 12 Debian Linux 5.0 sparc Debian Linux 5.0 s/390 Debian Linux 5.0 powerpc Debian Linux 5.0 mipsel Debian Linux 5.0 mips Debian Linux 5.0...
10 Pages(2500 words)Assignment

Health, Wealth, and Happiness: Financial Resources Buffer Subjective Well-Being after the Onset of a Disability

...? Health, Wealth, and Happiness: Financial Resources Buffer ive Well-Being after the Onset of a Disability Abstract The essay aims to address a two-fold objective to wit: (1) to summarize the article; and (2) to discuss the results or findings of the article. Health, Wealth, and Happiness: Financial Resources Buffer Subjective Well-Being after the Onset of a Disability Dylan M. Smith, Kenneth M. Langa, Mohammed U. Kabeto and Peter A. Ubel co-authored the article entitled “Health, Wealth, and Happiness: Financial Resources Buffer Subjective Well-Being after the Onset of a Disability”. The article was published on September 2005 in the Psychological Science Volume 16, Number 9 edition and...
3 Pages(750 words)Article

Rootkits

...Rootkits Introduction The rapid growth in modern technology has had both negative and positive impacts in today’s global development. Through network technology, communication has been made easier while carrying out business related activities has been enhanced. However, invention and implementation of technology has resulted to spread of viruses and worms. Rootkits is a form of malware which pose threat to computer management and networks (Bidgoli 19). This paper precisely discusses in detail “the state of a current computer rootkits, how it spreads, its impacts, how people are fighting it, and how technology pertaining to networks works.” Inclusively is an in depth description of the...
8 Pages(2000 words)Research Paper

Rootkits

...Rootkits Rootkits Introduction Computer attacks and cybercrime has been present in the world of computing in one form or the other since the emergence of the invention of computers. Rootkits are considered to be among the initial endeavors by hackers and intruders to gain access of systems. Koch (2007) stated that 1970s and 1980s saw the emergence of rootkits that allowed the intruders to gain access of the UNIX systems. Casad (2006) stated that it was a set of tools that could be uploaded in the computer under attack; the tools enabled the intruder to perform malicious activities and gave the control of the system to the attacker. The most powerful aspect about this...
2 Pages(500 words)Research Paper

Buffer, acid and base

.... It is a solvent that is only present in water. That means all body fluids have pH value either narrow or wide range. Scientific researches claim that the pH range of blood should be slightly basic i.e. from 7.35-7.45. If the range sees drastic change, it is very likely to cause illness or death as so much acidity and basicity is injurious for health. What are Acids, Bases and Buffers? Acids: The Arrhenius definition for acids states that acids produce hydrogen ions in aqueous solutions or when they are added to water. Acids release Hydrogen ion (H+). An acid reacts with magnesium, zinc or aluminum and forms hydrogen (H2(g)). It also reacts with such compounds that contain CO32- and carbon dioxide and water is...
4 Pages(1000 words)Research Paper

Buffers and Buffer Capacity

...Buffer and Buffer Capa Experiment Introduction A buffer is a chemical solution used to maintain and prevent rapid changes that might occur to pH in solutions. Similarly, a buffer is a mixture of molecules releasing or binding H+ so as to maintain a moderately stable pH. The function of a buffer is to minimize the change in pH whenever acid or base is added to a solution. There are several types of buffers and each particular buffer only stabilizes the pH of a solution within a particular range. One buffer might be operative within a range of pH 2 to pH 6, whereas another might be operative within a range...
4 Pages(1000 words)Essay

The Capital Buffer and Capital Planning-Banks

...The Article Capital Buffer and Capital Planning-Banks The primary objectives of the author of this article are to highlight the capital requirements of the Basel Capital Accord to identify, assess and aggregate all possible types of uncertainties relevant to them and underpin them. The article highlights two pillars that address on adequate capital defense. It defines the requirements that contribute to the abolition of miscellaneous behavior that has a negative effect on the overall financial position of an organization. The articles highlight various requirements of financial institutions under Pillar 2. He advocated for categorization as an important tool for applying a homogeneous measure to systems with analogous...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Buffer Overflow & Rootkits for FREE!

Contact Us