International Journal of Computer Science Issues
In the modern world operating system, various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behavior. There are some intrusions having the ability to hide themselves from being checked called armoring intrusions. In this paper, the authors present alternative organization of security systems. To distinguish operating system applications and security systems, the node is completely virtualized with current virtualized systems. The node is then checked by security systems from outside and the right security components are provided through job oriented architecture.