1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
14

Information flow is a useful mechanism that can enforce a variety of security policies that are hard to describe in simple acces

s control lists. Describe how you can use information flow as a building block to catch the following attacks or vulnerabilities. Please specify the information sources and sinks that one should track (1 point * 3): 1. A buffer overflow attack that overwrites a function pointer. 2. Link following attack where a victim process reads a file from an attacker-controlled directory. 3. Skype app on Android accidentally stores the password in plaintext in a file that's accessible to everyone.
English
1 answer:
I am Lyosha [343]3 years ago
3 0

Answer / Explanation

For proper clarity, we redefine information flow as the navigation of data between humans and systems.

A proper and well secured mode of movement of information or data flow information flow is a critical factor when considering the performance of a process, decision making and in communications. The following are common types of information flow.

It should also be noted that the advantages of an information flow process can not be over emphasized.

Referring back to the question where we are being asked to describe how information flow serve as a building block to curb attacks can also point back to some of its advantages.

(1) Buffer Overflow attack: This can be described as an abnormal behaviour where a program while writing data or transferring data to a buffer exceeds the buffer's boundary and overwrites to adjacent memory locations which may result in abnormal program behavior including memory access errors, incorrect results, and crashes.  We should also understand that buffers are allotted areas of memory set aside to hold data, often while moving it from one section of a program to another, or between programs. Thus, information flow helps to curb the buffer overflow attach by setting a boundary limit in the process of transfer of communication between the program and the buffer therefor casing a stoppage in the overwrite process of a buffer overflow.

(2)  This can be likened to the page catch attack or Directory Traversal Attacks  where an attacker is are able to traverse out of the current directory into parent directories usually by supplying a series of “../” (dot dot slashes). Sometimes it is possible to back out of the root directory of the Web server and traverse into other directories on the file system. Typically, directory traversal attacks allow the attacker to access or overwrite files that are not intended to be accessible. Now to link the attack, it should be noted that the attacker tries to overwrite the buffer therefore intentionally creating a loophole in the program. Thus, by implementing the information flow, we can also curb this.

(3) This can be likened to the aforementioned process. If passwords are accidentally stored in a location where it is accessible to everyone, then it posses a risk of it being hacked or the password being changed. However, to prevent this, we can simply make use of the clear catch or clear buffer catch process, this way, we are sure of the security of the transfer of data which also streamlines it down to one of the functionality of the information flow process.

You might be interested in
HELP ASAP 1ST CORRECT ANSWERS WILL BE BRAINLIEST!
dem82 [27]

Answer:

Question 1 (1 point)

A common theme in a story where one character prevails over another character could be

good vs. evil

Question 2 (1 point)

What is the theme of a story in which a person must find his own food out in the forest for three days?

man vs. nature

Question 3 (1 point)

What theme does the book How to Study probably have?

Educational

Question 4 (1 point)

The theme of a story is most like what?

Moral

Question 5 (1 point)

A common theme in literature related to new seasons and the blooming of plants is

.

Cycle of life

Question 6 (1 point)

In nearly every culture, literature, with reference to springtime or morning, can relate to the theme of ________.

Youth

Question 7 (1 point)

The coyote character in Native American tradition and the spider in African folklore are related to the theme of a ________.

trickster

Question 8 (1 point)

What is the theme of a story in which the stars are created by an animal tossing diamonds into the sky?

the beginning of creation

Question 9 (1 point)

What theme is common to "Cinderella stories" from various cultures?

if the shoe fits, wear it

Question 10 (1 point)

What is the theme of a story in which the character overcomes setbacks and succeeds in the end?

triumph over adversity

Explanation:

Please let me know which ones you got wrong/right. I hope this helped out!

3 0
2 years ago
Ever since they built the bowling alley in town,
olchik [2.2K]
B.beggining the question
7 0
3 years ago
Read 2 more answers
PLZ HELP I WILL GET IN BIG TROUBLE
melisa1 [442]

Answer:

32, 36, 40, 44, 48, 52, 56, 60, 64, 68, 72, 76, 80, 84, 88, 92, 96,

Explanation:

There are many numbers that fit this incredibly vague description

3 0
2 years ago
Read 2 more answers
Write a 2 paragraph summary based on the characters and quotes of lord of the flies
sweet [91]

Answer:

...

Explanation:

7 0
2 years ago
Using Subjects and Predicates in a paragraph.
Tpy6a [65]
You should write about when you first started taking care of the pet and fedding it and playing games with the pets toys and how you watched it
8 0
3 years ago
Other questions:
  • HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! evaluate ^3√343/512​
    8·1 answer
  • EASY 4TH GRADE What is the difference between a poem and a play? A. A poem has a clear rhythm while a play has dialogue. B. A po
    10·1 answer
  • 17.) Write the correct form of each incorrect pronoun.
    11·1 answer
  • What happens when something moves back and forth very quickly
    10·1 answer
  • What is the authors likely purpose for including this introduction?
    5·1 answer
  • Read the following passage:
    10·2 answers
  • What is Rachel's dearest possession? What does this help the king to realize?
    12·1 answer
  • Directions: Read each sentence and change the underlined modifier to another word that
    8·1 answer
  • IM TIMED PLEASE HELP :D Read the excerpt from "Black Hole Beginnings."
    9·1 answer
  • Temporal isolation occurs when two different populations.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!