Master Template

نویسنده

  • Simson L Garfinkel
چکیده

PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/03/$17.00 © 2003 IEEE ■ IEEE SECURITY & PRIVACY 17 A fundamental goal of information security is to design computer systems that prevent the unauthorized disclosure of confidential information. There are many ways to assure this information privacy. One of the oldest and most common techniques is physical isolation: keeping confidential data on computers that only authorized individuals can access. Most single-user personal computers, for example, contain information that is confidential to that user. Computer systems used by people with varying authorization levels typically employ authentication, access control lists, and a privileged operating system to maintain information privacy. Much of information security research over the past 30 years has centered on improving authentication techniques and developing methods to assure that computer systems properly implement these access control rules. Cryptography is another tool that can assure information privacy. Users can encrypt data as it is sent and decrypt it at the intended destination, using, for example, the secure sockets layer (SSL) encryption protocol. They can also encrypt information stored on a computer’s disk so that the information is accessible only to those with the appropriate decryption key. Cryptographic file systems1–3 ask for a password or key on startup, after which they automatically encrypt data as it’s written to a disk and decrypt the data as it’s read; if the disk is stolen, the data will be inaccessible to the thief. Yet despite the availability of cryptographic file systems, the general public rarely seems to use them. Absent a cryptographic file system, confidential information is readily accessible when owners improperly retire their disk drives. In August 2002, for example, the United States Veterans Administration Medical Center in Indianapolis retired 139 computers. Some of these systems were donated to schools, while others were sold on the open market, and at least three ended up in a thrift shop where a journalist purchased them. Unfortunately, the VA neglected to sanitize the computer’s hard drives—that is, it failed to remove the drives’ confidential information. Many of the computers were later found to contain sensitive medical information, including the names of veterans with AIDS and mental health problems. The new owners also found 44 credit card numbers that the Indianapolis facility used.4 The VA fiasco is just one of many celebrated cases in which an organization entrusted with confidential information neglected to properly sanitize hard disks before disposing of computers. Other cases include:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EasyGenetic: A Template Metaprogramming Framework for Genetic Master-Slave Algorithms

In this work we present EasyGenetic, a genetic solver based on template metaprogramming, that enables the user to configure the solver via templates. The framework allows to combine flexibility with efficiency. The framework is designed to be applied to problems for which a master-slave solution strategy can be defined. In the realm of combinatorial optimization, such problems can be those for ...

متن کامل

Large-area microfabrication of three-dimensional, helical polymer structures

A technique has been developed to fabricate polymeric helices with sub-micron dimensions. These helices are made using a double-templating process, in which an inorganic thin film deposited using glancing angle deposition acts as the master. The shape, pitch, handedness and number of turns of the polymer helices can be tuned by altering the deposition parameters of the master film. The structur...

متن کامل

Parallel fabrication of RNA microarrays by mechanical transfer from a DNA master.

A new method for fabrication of RNA microarrays is described. The approach involves cohybridization of a short, biotinylated DNA oligonucleotide and an RNA probe sequence to DNA templates spotted onto a master array. Next, the short DNA sequence and the RNA probe are linked using a T4 DNA ligase. Finally, a poly(dimethylsiloxane) (PDMS) monolith modified on the surface with streptavidin is brou...

متن کامل

Fabrication of flexible UV nanoimprint mold with fluorinated polymer-coated PET film

UV curing nanoimprint lithography is one of the most promising techniques for the fabrication of micro- to nano-sized patterns on various substrates with high throughput and a low production cost. The UV nanoimprint process requires a transparent template with micro- to nano-sized surface protrusions, having a low surface energy and good flexibility. Therefore, the development of low-cost, tran...

متن کامل

Generation of a library of particles having controlled sizes and shapes via the mechanical elongation of master templates.

Herein we describe a versatile and readily scalable approach for the fabrication of particles with a variety of shapes and sizes from a single master template by augmenting the particle replication in nonwetting templates (PRINT) method with mechanical elongation. Repetition of the elongation steps in one direction leads to the fabrication of linear particles with high aspect ratio (AR), over 4...

متن کامل

Error propagation in the hypercycle.

We study analytically the steady-state regime of a network of n error-prone self-replicating templates forming an asymmetric hypercycle and its error tail. We show that the existence of a master template with a higher noncatalyzed self-replicative productivity a than the error tail ensures the stability of chains in which m < n-1 templates coexist with the master species. The stability of these...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003