It Monoculture Vulnerabilities and Defenses

نویسنده

  • Fred B. Schneider
چکیده

T he term monoculture originates in the biological sciences, where it refers to a population entirely comprising instances of a single organism. Monocultures are rare in nature, and for good reason: they risk extinction from pathogens and have less chance of adapting to changing conditions. A pathogen could destroy some members of a diverse population but not all of them—diversity thus helps ensure survival of the population. Although nature abhors monocultures, cyberspace seems to favor them. A collection of identical computing platforms is easier, hence cheaper, to manage because mastering one interface and making one set of configuration decisions suffices for all. In addition, user training costs are reduced when job transfers do not have the overhead of learning yet another operating system and suite of applications; investments in education about how to use or manage a system also can be amortized over a larger user base in a monoculture. Finally, interoperability of a few different kinds of systems is far easier to orchestrate than integrating a diverse collection, standards not withstanding. So networking is usually easier to support within a monoculture. Mindful of these advantages, the public and private sectors both tend to adopt procurement policies that foster creating computer monocultures. The past five decades of computer usage in organizations has been a series of epochs, each one characterized by a single dominant instruction set architecture and operating system. Today it is Intel’s x86 architecture running Microsoft’s software. Two things are different today than in the past, though: the widespread • dependence on computing systems for day-to-day operations, and the interconnection of computing systems, which • enables computers to exchange content (including malware).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Browsers Defenses against Phishing, Spoofing and Malware 1 Ssl-based Logon

Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we discuss existing and proposed defense mechanisms. We highlight the vulnerabilities of current defenses, and the challenges of validating and adopting new defenses.

متن کامل

Diversity-Based Approaches to Software Systems Security

Software systems security represents a major concern as cyberattacks continue to grow in number and sophistication. In addition to the increasing complexity and interconnection of modern information systems, these systems run significant similar software. This is known as IT monoculture. As a consequence, software systems share common vulnerabilities, which enable the spread of malware. The pri...

متن کامل

PointGuardTM: Protecting Pointers From Buffer Overflow Vulnerabilities

Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the dominant form of software security vulnerability. This is because most buffer overflow defenses provide only partial coverage, and the attacks have adapted to exploit problems that are not well-defended, such as heap overflows. This paper presents PointGuard, a compiler ...

متن کامل

PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities

Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the dominant form of software security vulnerability. This is because most buffer overflow defenses provide only partial coverage, and the attacks have adapted to exploit problems that are not well-defended, such as heap overflows. This paper presents PointGuard, a compiler ...

متن کامل

جذب نیتروژن، فسفر و پتاسیم به وسیله گیاهان زراعی و علف‌های هرز در سامانه‌های مختلف کشت مخلوط غلات-لگوم

To investigate the amount of nitrogen (N), phosphorous (P) and potassium (K) uptake in crops and weeds in cereals-legumes intercropping, a field experiment was performed in 2014-2015. Treatments included 10 monoculture (wheat, barley, triticale, pea and bean with and without weeds) and 6 intercropping (wheat + pea, wheat + faba bean, barley + pea, barley + faba bean, triticale + pea and tritica...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009