Home |
What's New |
Products |
Feedback |
Help
The recent attacks on the internet indicate a need for fundamental changes in the computer programs used to implement our systems. We recommend the implementation of the concept of Trust to prevent attacks such as the ILoveYou email.
Basic Operating System design requirements:
- a single email send function
- a single file open function
- each execution function must have an ID
- a characteristic of Trusted must exist for each executable and each user
- each directory and user will default to Trusted
Modification to prevent the email bug:
- a directory shall be marked as non-Trusted by only a Trusted executable
- any sub directory of a non-Trusted directory is non-Trusted
- any executable launched from a non-Trusted directory is non-Trusted
- any email sent from a non-Trusted executable will ask user prior to
sending the email (will supply the requesting executable ID)
- all email applications shall store received email and attachments in
non-Trusted directories
Modification to prevent malicious destruction of Files: (over and above prevention of email worm)
- an open for update from a non-Trusted executable will ask the user prior
to being granted (will supply the requesting executable ID)
Send mail to webmaster@KwBSolutions.com with
questions or comments about this web site.
Copyright © 2000 Knowledge Based Solutions