A study of hardware architecture based attacks to bypass operating system security

2019 ◽  
Vol 2 (4) ◽  
Author(s):  
Vaibhav G. Lokhande ◽  
Deepti Vidyarthi

2015 ◽  
Vol 26 (1) ◽  
pp. 6-24 ◽  
Author(s):  
Christian Röpke ◽  
Thorsten Holz


2003 ◽  
Vol 18 (3) ◽  
pp. 291-306 ◽  
Author(s):  
Cheryl L. Dunn ◽  
Gregory J. Gerard ◽  
James L. Worrell

Systems and financial statement auditors are often responsible for evaluating compliance with system security controls as part of their annual audit procedures. This assignment provides a practical learning experience that relates your course material to actual tasks practitioners perform. You are provided with simulated data from a realistic company example and are asked practitioner-relevant questions covering a variety of issues related to network operating system access. Monitoring and limiting network operating system access and mitigating the related risk is crucial since any application (including accounting applications) can be accessed, and potentially compromised, through the network operating system.



2015 ◽  
Vol 55 ◽  
pp. 1-20 ◽  
Author(s):  
Jukka Ruohonen ◽  
Sami Hyrynsalmi ◽  
Ville Leppänen


Sign in / Sign up

Export Citation Format

Share Document