1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
14

Information flow is a useful mechanism that can enforce a variety of security policies that are hard to describe in simple acces

s control lists. Describe how you can use information flow as a building block to catch the following attacks or vulnerabilities. Please specify the information sources and sinks that one should track (1 point * 3): 1. A buffer overflow attack that overwrites a function pointer. 2. Link following attack where a victim process reads a file from an attacker-controlled directory. 3. Skype app on Android accidentally stores the password in plaintext in a file that's accessible to everyone.
English
1 answer:
I am Lyosha [343]3 years ago
3 0

Answer / Explanation

For proper clarity, we redefine information flow as the navigation of data between humans and systems.

A proper and well secured mode of movement of information or data flow information flow is a critical factor when considering the performance of a process, decision making and in communications. The following are common types of information flow.

It should also be noted that the advantages of an information flow process can not be over emphasized.

Referring back to the question where we are being asked to describe how information flow serve as a building block to curb attacks can also point back to some of its advantages.

(1) Buffer Overflow attack: This can be described as an abnormal behaviour where a program while writing data or transferring data to a buffer exceeds the buffer's boundary and overwrites to adjacent memory locations which may result in abnormal program behavior including memory access errors, incorrect results, and crashes.  We should also understand that buffers are allotted areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Thus, information flow helps to curb the buffer overflow attach by setting a boundary limit in the process of transfer of communication between the program and the buffer therefor casing a stoppage in the overwrite process of a buffer overflow.

(2)  This can be likened to the page catch attack or Directory Traversal Attacks  where an attacker is are able to traverse out of the current directory into parent directories usually by supplying a series of “../” (dot dot slashes). Sometimes it is possible to back out of the root directory of the Web server and traverse into other directories on the file system. Typically, directory traversal attacks allow the attacker to access or overwrite files that are not intended to be accessible. Now to link the attack, it should be noted that the attacker tries to overwrite the buffer therefore intentionally creating a loophole in the program. Thus, by implementing the information flow, we can also curb this.

(3) This can be likened to the aforementioned process. If passwords are accidentally stored in a location where it is accessible to everyone, then it posses a risk of it being hacked or the password being changed. However, to prevent this, we can simply make use of the clear catch or clear buffer catch process, this way, we are sure of the security of the transfer of data which also streamlines it down to one of the functionality of the information flow process.

You might be interested in
What do you know about Simon Wheeler from his speech? He is highly educated. He likes to tell stories. He takes a long time to g
UkoKoshka [18]

Simon wheeler from ‘The Notorious Jumping Frog’ is described as a man who is lazy and bald though sometimes he is clever and usually aggressive. Based on the story, the appropriate choice that would describe Simon is that ‘He likes to tell stories’, it is because when you read the story, you can see that Simon likes telling long stories.

3 0
3 years ago
Read 2 more answers
Please help i would really really appreciate it
Finger [1]
C. He uses personification to give the fog the human quality of disillusionment.

The fog can hunch,move, and can look which are some human qualities. The fog seems human because of the qualities.
I hope this helped
5 0
3 years ago
Heat is thermal energy transferred from one object to another because of a difference in ____
Varvara68 [4.7K]
Heat is thermal energy transferred from one object to another because of a difference in Temperature
7 0
3 years ago
Writers reveal the motivation of their characters to
Norma-Jean [14]
To build motivation for the character gives a backbone to the story and about the Arthur for example if the Arthur got the motivation from seeing a kid take a candy out of a store that motivation for that character would be a bad guy or a heel and or antagonist there for the motivation for a character is very important they reveal it so you can get a bit of a background on the character in more information on the story and the Arthur.
7 0
3 years ago
What gift did Dionysos give to Midas?
mote1985 [20]

Answer:

King Midas received his gift of turning everything into gold from the Greek god Dionysus

8 0
3 years ago
Read 2 more answers
Other questions:
  • Based on tone, why is it fitting that "The Lamb" is featured in a volume titled songs of innocence
    10·2 answers
  • this is the restatement of a written work in ones own words that keeps the basic meaning of the original work
    15·1 answer
  • Which is the best example of a strong hook in a presentation?
    15·2 answers
  • Which example is most likely from a cover letter ?
    11·1 answer
  • Read the sentences. Some scientists are for a manned mission to Mars. Some scientists are against a manned mission to Mars. Ther
    9·2 answers
  • What is a middle name for a boy that starts with r and ends with t
    5·2 answers
  • Vocabulary - arduousof words from Beowulf.
    7·1 answer
  • What strange items does Sherlock Holmes find in Dr. Roylott's room? SELECT ALL THAT APPLY (The Speckled Band)
    15·2 answers
  • If i wear a 1x hoodies for women, what size would i wear in hoodies for men?
    12·2 answers
  • Give Us Our Peace
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!