3 L.O.S.S.- Hard To Have Chernobyl

Provided by: International Journal of Computer Science and Network Security
Format: PDF
Organizations which are fully computerized and also are linked to outer world through common communication channels are prone to hacker's attack. Hackers search for vulnerabilities through different techniques such as operating system fingerprinting, stealth scanning etc. And then they start exploiting the same vulnerabilities. Hackers can do the same because the servers have the single operating system for controlling all the functionalities and hardware of the machine. In this paper, the authors are introducing a three layered system for controlling the hardware and functionalities of the servers so that exploiting the vulnerabilities, will become tougher.

Find By Topic