Chapter 3

The Proposed Solution

Abstract

Several concepts are introduced, including “the principle of least privilege”, “trust domains,” and “defense by design.” Unfortunately, today’s operating systems and applications (e.g., web browsers) are incapable of providing granularity, or effective embodiment of trust domains, or confinement to apply the concept of least privilege. And as a result, a call for defense to be an intrinsic element of computer system design is made.

Keywords

cloud computing
bring your own device (BYOD)
access controls
trust domains
least privilege
Computing has changed dramatically over the past decade. Even the most prophetic among us could not have foreseen how cloud computing was going to shift and “even out” the ...

Get How to Defeat Advanced Malware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.