O'Reilly logo

How to Defeat Advanced Malware by Simon Crosby, Henry Dalziel

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

The Proposed Solution

Abstract

Several concepts are introduced, including “the principle of least privilege”, “trust domains,” and “defense by design.” Unfortunately, today’s operating systems and applications (e.g., web browsers) are incapable of providing granularity, or effective embodiment of trust domains, or confinement to apply the concept of least privilege. And as a result, a call for defense to be an intrinsic element of computer system design is made.

Keywords

cloud computing
bring your own device (BYOD)
access controls
trust domains
least privilege
Computing has changed dramatically over the past decade. Even the most prophetic among us could not have foreseen how cloud computing was going to shift and “even out” the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required