What are the technologies that provide imperative levels of protection against unknown attacks?


There are three technologies that supports imperative levels of protection against unknown attacks such as software fault isolation, intrusion detection through program analysis, and fine-grained mandated access controls.

These technologies distribute an imperative feature: they do not based on the efficient operation of the programs; rather than, they provide a secondary layer of protection should a program be intrude and corrupted. It is applicable that these systems can also enclose flaws; but in order for a victorious apply to take place, both the application and the secondary protection need to be undermined simultaneously. As error will carry on to be patched, it is much less expected that two overlap error will be present and be known concurrently than that an individual error will be known.

Software Fault Isolation − Software Fault Isolation is a method to make Java-like sandboxes for dynamically-loading random program in a language-neutral manner. The objective of SFI is to enable a host program to safely implement potentially dangerous structure in its own address space.

The SFI approach has two main components such as the first one is the rewriting of the untrusted module to avoid it from accessing some memory out of its sandbox. The second component is the verification of the module’s program before loading it into memory. This step checks whether the rewriting completed in the earlier part is still present and logical in the code.

Intrusion Detection by Program Analysis − The intrusion detection system (IDS) plays an important role in finding potential security threats and violations. The main service is to continuously monitor computer and network systems for signs of intrusive activities, and it is an essential element of the defence-in-depth security paradigm.

Generally, intrusion detection systems are categorised depends on their data source, detection method, deployment structure, deployment software, anomaly type and defence structure. A network anomaly detection system (NADS) is a type of anomalybased IDS that uses machine learning (ML) and artificial intelligence (AI) techniques on network traffic to understand how to difference between anomalous and normal traffic.

Fine-grained access controls − Fine-grained access control is the capability to grant or deny access to critical assets, including resources and data, depends on multiple conditions and several entitlements to a single data resource.

Fine-grained access control enables organizations to control which users, teams, or roles have access to specific element of data, including columns or rows of data. The granular control helps keep the confidentiality, sensitivity, and need of specific data without hamstringing those users who require that access to done their work. By automating and defining the policies and fine-tuning them properly, the organization can focus resources on making business value.

Updated on: 04-Mar-2022

170 Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements