Preview

Information Technology, Information System

Satisfactory Essays
Open Document
Open Document
309 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology, Information System
STRAYER UNIVERSITY
ALEXANDRIA CAMPUS

Dr. Albert C. Dominic

CIS 512 Enterprise Architecture

Batjargal Jargalsaikhan

Assignment 3

6/8/2012
A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability.
In July 2000, a vulnerability to buffer overflow attack was discovered in Microsoft Outlook and Outlook Express. A programming flaw made it possible for an attacker to compromise the integrity of the target computer by simply it sending an e-mail message. Unlike the typical e-mail virus, users could not protect themselves by not opening attached files; in fact, the user did not even have to open the message to enable the attack. The programs' message header mechanisms had a defect that made it possible for senders to overflow the area with extraneous data, which allowed them to execute whatever type of code they desired on the recipient's computers. Because the process was activated as soon as the recipient downloaded the message from the server, this type of buffer overflow attack was very difficult to defend. Microsoft has since created a patch to eliminate the

You May Also Find These Documents Helpful

  • Good Essays

    Information system

    • 3772 Words
    • 32 Pages

    According to the graph below, if a country is currently producing at point X, the opportunity cost of producing another consumer good is…

    • 3772 Words
    • 32 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Buffer overflow attacks occurs when hackers sending a large amount of data than the buffer was intended to hold, this large amount data immediately overwrite and corrupt other data in the buffer. Data contain codes to trigger specific actions that controls the program execution path and hijack the control of the program to execute the hacker 's code instead of the system process code. It could change and modify user data, disclose sensitive information, brings down applications and lock up the system or applications.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information System

    • 323 Words
    • 2 Pages

    To enhance the ability to manage a nostalgic record store for success investment is needed in technology and information systems. This proposal will address the technology management plan and will discuss five different types of information systems. A list of benefits and drawbacks of each system will be covered.…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 729 Words
    • 3 Pages

    1. In relation to your current business environment (or one that you are familiar with), identify at least two different types of information technology that may be used when completing work tasks.…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    information system

    • 795 Words
    • 4 Pages

    RBC is facing the challenges of implementing a new customer service platform over its existing CSR system, as well as integrate all the other functions of its daily personal banking sub-systems. The banking group also need to improve its current banking proof procedures as well as explore new business opportunities such as e-banking and other network based banking services.…

    • 795 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    information technology

    • 420 Words
    • 2 Pages

    What are the two meanings of “corporate ethics” in organization today? What does each definition imply for IT practices? How does the economic environment affect this?…

    • 420 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays
  • Good Essays

    information system

    • 1242 Words
    • 5 Pages

    In all information systems, data resources must be organized and structured in some logical manner, so that they can be:…

    • 1242 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Information System

    • 3729 Words
    • 17 Pages

    1. Perhaps the most striking face about natural disasters in relation to AIS controls is that…

    • 3729 Words
    • 17 Pages
    Good Essays
  • Better Essays

    Users, data entry clerks, system operators, and programmers frequently make errors that contribute directly or indirectly to security problems. In some cases, the error is the threat, such as a data entry error or a programming error that crashes a system. In other cases, the errors create vulnerabilities. Errors can occur during all phases of the systems life cycle.…

    • 1117 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Information System

    • 396 Words
    • 2 Pages

    Part 1 of question - Using the airlines example mentioned above, propose several possible IT solutions…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Technology

    • 1778 Words
    • 8 Pages

    The Internet, this worldwide and open network with millions of computers connected has been an impressive success story in recent years. The rapid advancement of the Internet in business marks the starting point of our reflection. Personal computers and the wide availability of internet service providers, consumers have seen a drastic change in their relationship with suppliers.…

    • 1778 Words
    • 8 Pages
    Powerful Essays