h a l f b a k e r y"More like a cross between an onion, a golf ball, and a roman multi-tiered arched aquaduct."
add, search, annotate, link, view, overview, recent, by name, random
news, help, about, links, report a problem
browse anonymously,
or get an account
and write.
register,
|
|
|
Current computer security software relies on each machine to diagnose and fix itself. But if a computer has been compromised, then it is less likely to be capable of diagnosing or fixing itself because hackers would do their best to make sure of that.
The proposed solution is a small, cheap, secondary
computer having a small amount of RAM that runs independently of the main computer. This secondary computer would serve no other purpose than to detect viruses and other security problems in the main computer, and fix them whenever possible. To guarantee its immunity to hacking, it would be made incapable of running any data from the main computer.
Features:
* Independent CPU, BIOS, RAM and harddrive
* Can directly access all memory and devices on the main computer
* Can never run code from the main computer
Duties:
* Scan for viruses and malware
* Verify vital disk sectors
* Store secure hashes of files (mainly program files) to detect any later changes
* Monitor network activity to detect intrusions and bots
Added Dec 01, 2011:
Although in the same box as the main computer, the secondary "guard" computer would be on a completely separate board. This is to reduce the possibility of hackers finding a way to affect it indirectly.
And though the main computer would provide all of the useful functions, the guard computer would control actions such as booting, shutting down and communications. It would start before, and shut down after the main computer. Before allowing a boot to occur, it could check for viruses or harmful changes in:
* The boot sectors of all hard drives and partitions
* Flashable ROM
* CMOS RAM
* Hardware configurations
* The (Windows) registry
Checking the registry could take a while, so it might not be practical to check it every time.
Before allowing the computer to shut down, it would make sure that all processes had a chance to save any important data.
Please log in.
If you're not logged in,
you can see what this page
looks like, but you will
not be able to add anything.
Destination URL.
E.g., https://www.coffee.com/
Description (displayed with the short name and URL.)
|
|
It wouldn't be immune from hacking; it would just be
targeted in different ways. It wouldn't run code
from the main computer, but it would need to get
virus/malware updates from somewhere; and that's
where it would be attacked. Still, the idea of having
a secondary "clean" computer monitoring the primary
computer seems good. It seems like this could be
built into the primary computer hardware, and just
have separation of whatever necessary systems. |
|
|
Google for "virtual machine" .... |
|
|
8th of 7,
I'm familiar with virtual machines. The problem is, there always seems to be some way to defeat software-based security measures. That's the reason for choosing a machine that isn't virtual. |
|
|
The idea (computers cross-checking eachother) is
great. However, the proposal as written is more
like having a "security guard" than a "buddy
system". |
|
|
Why not, instead, pair existing computers up?
Yes, I appreciate that both machines could be
infected in the same way, or could cross-infect
eachother. But perhaps the communications
portal for cross-diagnosis could be very restrictive
(in the same way you envisage a restricted
interaction between your "bodyguard" and its
"employer"). |
|
|
Such a true "buddy system" might work well if the
paired machines were, in each case, a Mac and a
PC. |
|
|
Any serious techie has a laptop capable of scanning a
networked computer with various repair utilities.
(including disc scanning) Baked if not well known. |
|
|
A small cheap secondary computer is notably different than just going around with a laptop that can repair your desktop. It could simply be a sub-computer within the main console that is just meticulously kept seperate. |
|
|
//. It seems like this could be built into the primary computer hardware, and just have separation of whatever necessary systems.// |
|
|
//A small cheap secondary computer is notably different than just going around with a laptop that can repair your desktop. It could simply be a sub-computer within the main console that is just meticulously kept seperate.// |
|
|
I'm not that keen on a computer-to-computer process - it requires too much trust across unsafe boundaries - but, how about reeling it back into a more conjoined-twin type of scenario? |
|
|
Or to move away from the anthropomorphism, if you can have a dedicated soundcard, a dedicated videocard, a dedicated network card...etc - then why not a dedicated security card? It might benefit from improved security controls that would be impractical to impose on a more general purpose system... |
|
|
//Why not, instead, pair existing computers up?// |
|
|
Some "mission critical" systems (like computers that control aeroplanes or rockets) are built kind of like this. The specification for the control computer is given to 3 different manufacturers, who design and implement independent computers to perform the same task; the three are all connected to the same inputs, and their outputs are used to "vote" on the correct course of action to take. If one of them misbehaves, it gets "outvoted" by the other two, and hopefully doesn't cause the plane to crash or whatever. |
|
|
//why not a dedicated security card?// |
|
|
Security is one of the few pieces of a design that can't be made modular - it inherently pervades the design of the entire system (or at least large amounts of it). |
|
| |