Tamper-proof Operating System
- 70 Downloads
Operating System with a robust design, as not to allow the execution of malicious code. Access to internal data and procedures are never allowed without the proper authorization. In its more strict implementations, this Operating System will have attack detection mechanisms. If the attack is of a certain level, the Operating System may even delete all its code and/or data.
The handling of sensible data in Information Systems is currently very usual. Which data is to be considered sensible is up to the application, but at least we can consider those such as personal data, financial data as well as access control data. Actors dealing with such Information System (clients/citizens, service providers, integrators, etc.) have to be aware of the security level achieved within the system.
Although this is a very important issue in any system, when biometric information is handled it...
- 1.Rejman-Greene: Security considerations in the use of biometric devices. Information Security Technical Report 3, 77–80 (1998)Google Scholar
- 4.Criteria, C.: Biometric evaluation methodology supplement (bem). Common Methodology for Information Technology Security Evaluation - http://www.cesg.gov.uk/site/ast/biometrics/media/BEM_10.pdf (2002)
- 9.ISO ∕ IEC_JTC1 ∕ SC17: ISO/IEC 7816 Parts 3, 4, 8, 9 & 11 (1987–2005)Google Scholar