An Exceptional Experience

An Exceptional Experience

This post is also available in: heעברית (Hebrew)

20235878_sThe vulnerability of legacy networked computer systems was discussed in an earlier article. In addition to that, hackers can utilize social engineering to take advantage of careless users, using fake emails and websites that lead users to download malware. A new approach to defenses is required to address this problem.
This article deals with the requirements for an optimal networked system that can still serve the user even when it is infected with malware, with the assumption being that the infection is unavoidable but the user should still be able to use the system (via notebook, smartphone, pad, etc.) and surf the web (visit websites, download files) safely.
First, the protection method should withstand malware even when it masquerades as an authenticated site or as another user. Even if the user is presented with false displays or communications generated by the malware, his actions shouldn’t lead to him divulging valuable information or modifying applications, with disasterous results. In fact, such attempts may be used for seeding false information, to be used later in order to expose the hacker’s presence when he makes any further moves.
Second, the computer system should work seamlessly for the user, with no modification to his interface or interaction. He might get some warnings and suggestions for certain actions, similar to those users receive when using legacy systems, but no behavioral change, special training or installations will be needed. This will allow for gradual market penetration even with modified systems. The system will, in addition, still provide protection when interacting with other legacy systems, and can run all the usual legacy application in use. The system will simply contain the malware and will not enable its further dissemination within the network.

www.i-hls.com

The user should also be able to surf the WWW freely without worrying that he is going to lose control of his system if he accidentally downloads malware, phishing and pharming should no longer pose a risk to him. The system will support downloads of files and applications and run them with the conventional legacy components, just as it did before the modification.
The system will be designed to protect certain data and applications critical to the users. This information represents a fraction of the bits stored or communicated by the computer system. What is protected will depend on what will be defined as critical to the user.

Such data may include:

  • Passwords
  • Encryption codes
  • Firewall black and white lists
  • Email contact information
  • Email content
  • Office application content

Such applications may include:

  • Firewall program
  • Encryption program
  • Email
  • Office applications
  • Cloud applications
  • Location based applications…

During all this the system will still maintain the features of scalability, modularity, upgradeability, integration, and simultaneous operation, all this resulting in a complex but safe system – maintaining the security, privacy, and safety of the users.
Providing proper protection will allow the users some peace of mind, and finally they will get an exceptional experience free of worries while surfing the world wide web.

By Moti Barkan, ImageZone Inc