Solution:
Some
vulnerabilities exist in Microsoft office that might allow remote code
execution. A security update launched for Microsoft office resolves the
vulnerability that disclosed publicly as well as sends the report of this
vulnerability in Microsoft office privately. The vulnerabilities might give
permission to the remote code execution when the user opens the Microsoft word
document as specially crafted or if the user opens up the word document, which
is located at a similar network directory as a specially crafted library
document.
An
Attacker might get the same user rights who did successfully exploited either
of these vulnerabilities as a logged-on user. Those users who have some user
rights or their accounts are configured to take some user rights, or controls could
be less impacted rather than users who operate the account as administrative user
rights. The update has been introduced for the enhancement of the security which
has been rated more important for all of the supported editions of Microsoft
office such as Microsoft office 2003, 2004 for Mac, 2007 as well as Microsoft
office 2008 for Mac (Stallings, Brown, Bauer, & Bhattacharjee, 2012).
The vulnerabilities are addressed by the
special updated for security throughout the way of correction that the
Microsoft office handles the graphics within specially crafted Microsoft Word
documents as well as through the manner correction in which Microsoft office
loads the external libraries (N. Nissim, 2016).
On
the other side, the attacker who wants to see your word document may have a non-privileged
account on the system. At that time, the attacker can easily attack and try to
break the security in the same network library. When attacker does this, he
will try to get administrative rights for viewing the document which you have
placed in the particular network directory path. This update is very powerful
which can easily handle this situation and make the attacker or any other
person non-permit to see the file or document currently. So with the help of
this update the attacker cannot access such file as well as the attacker cannot
change these controls directly (Salah, Calero, Bernabé, Perez, & Zeadally, 2013).
As
mentioned above paragraphs, the system cannot be reachable for the attacker,
and he cannot get permission to view such document whether he is on a similar
network because all of the ways are closed when the update launched.
Key
Issue of the Security update
There is some kind of
issues with this security update. As Microsoft knowledge base Article 2489293 has
documented the current known issues that the customers of Microsoft Windows and
Office can face if they install this security update. This article is also
documenting some valuable recommended solutions for these kinds of issues. So,
some important recommendations are mentioned following (Marlow, 2010).
Security
Vulnerabilities, Issues & Recommendation
By using the Microsoft
Update service, the customers can easily configure the update module by
activating the windows update options automatically to check the new updates to
install in the computer online. Those users of Microsoft Windows who have enabled
this feature already they don’t need to configure again because they have
already selected this option as well as they will get the latest updated and
installed automatically on the fixed defined time that the Windows selected by
default. Those users of Microsoft Windows who have not enabled this feature, they
should have to enable this option to get the security updates from Microsoft
Windows to download the update as well as install it manually.
Failure
of Security Architecture and Security Limitation
Part
2
Discussion
on the failure of the existing architecture
The
user has successfully installed the security updates from Microsoft and believes
that his computer security is highly alert, but there are many flaws remain
where the wise attacker can attack to get control over the system. As in the
information security books, articles, and theories enlightening the fact the security
cannot be permanent. The Windows security updates provide you a strong firewall
along with a windows defender that makes the computer security as well as shifts
or throw any kind of viruses on the chest to delete permanently from the
computer.
The
Windows defender provides an extra benefit that it secures the computer from
unexpected entrances such as attackers. The attackers write some instructional
malicious scripts and send it or place in the computers through the internet
from any website or through any kind of software or through any ads you clicked
on the websites whether you have clicked to close that ad. When you click on
the close symbol appeared on the ad, or when you install the additional
software or application on the computer, you have given the permission to
install the additional software on your computer, the malicious scripts execute
and start to retrieve the information, and behind the scene those scripts work in
the background. By executing these scripts into the computer, makes firewall of
the computer and the security architecture weaker or somehow destroy that is
the key for attackers to enter in the computers to get the administrative
controls. This is the overview or knowledge of how the attacker can damage the security
architecture of the user’s computer to get full control over the system (Han, 2008).
In
the technical words, I have brought some valuable information on the failure of
existing security architecture. I have found some basic and major reasons that
weaken the windows security architecture as we know that Open source software,
Linux, Unix, and Mac OS X are always precautious about the security of the
system. Comparatively, Windows provides weaker security due to its connectivity
with other devices over the network, so it makes the game easier for the
attackers to breach. Furthermore on Windows, it also has not shared the
weaknesses of the security architecture, which has made the Windows platform
much weaker than others, and it is much easy to exploit as well as very
difficult to clean it up afterward (M. Suchara, 2011). The major reasons for the failure of
the existing security architecture have been listed below.
·
The registry of Windows, as well as the complicated
installation of software mess related to it.
·
The port exposed by default
·
The network sharing protocols are poorly
designed that failed for the security measures adequately to account.
·
The administrative messaging protocols are
poorly designed that failed for the security measures adequately to account.
·
The clients from email are also poorly
designed, which provided access to untrusted scripts to spam one’s own contacts
unwittingly.
·
The architecture of an integrated web
browser that did open the untrusted executable by designing.
Description
of Security Architecture
In
the world of information security, we love to use the frameworks or
architectures to make our security more secure. We have now standards such as
ISO 27001/27002 and PCI DSS, regulations such as FISMA, HIPAA as well as a
number of different kind of templates, designs as well as the guidelines often
grouped under best practices heading. Some companies like to attempt to adhere
to these frameworks without having a better understanding of their limitations
as well as the applicability.
The
PCI DSS is prescriptive about the requirements for the security for its
instance. The organizations sometimes misinterpret the PCI DSS according to
their budgeting condition as well as by seeing the practices of the business. Several
companies and organizations take a try to adopt the PCI DSS model by
considering it to secure their non PCI environments without consideration
threats as well as the security practices which can be different (Chao, 2011).
We
can understand it by an example, considering the number of controls listed as
part of ISO 27002. To build an information security program or implant the
security architecture, the companies attempt to implement all of them. They do
this despite ISO 27001 advising that the controls for their implementation or
application totally depend on the needs and objectives, the size, structure,
the employed processes as well as the security requirements of the organization
Discussion
of security Limitations
There
are some limitations of the security architectures. Everyone who has a computer
or laptop computer has a security architecture on their computer. These
architectures used commonly used to protect the data of the user. These
architectures are very beneficial because it gives the red signals to the
information stealers or attackers of any kind or external forces which are
harmful to your information or data.
On
the other side, the architecture has some limitations because we have discussed
before that every security in the world is not complete. There are some
limitations that exist where the security architecture of your system will fail
to handle the breaches. The Windows security updates provide you a strong
firewall along with a windows defender that makes the computer security as well
as shifts or throw any kind of viruses on the chest to delete permanently from
the computer (C. Karlof, 2004).
Some
breaches never are stronger by the attackers, and you cannot handle those
attacks the security architecture fixed to handle. Because the security
architecture only controls those attacks which are defined or know, but some
other unknown attacks by scripts can cause the failure of the security architecture.
The attackers write some instructional malicious scripts and send it or place
in the computers through the internet from any website or through any kind of
software or through any ads you clicked on the websites whether you have
clicked to close that ad. When you click on the close symbol appeared on the ad,
or when you install the additional software or application on the computer, you
have given the permission to install the additional software on your computer,
the malicious scripts execute and start to retrieve the information, and behind
the scene those scripts work in the background. By executing these scripts into
the computer, makes firewall of the computer and the security architecture
weaker or somehow destroy (Brown, 2003).
References
of Failure of Security
Architecture and Security Limitation
Brown, D. W. (2003). Application programs
for motion control devices including access limitations. Patent and
Trademark Office.
C. Karlof, N. S. (2004). TinySec: a link
layer security architecture for wireless sensor networks. In Proceedings of the
2nd international conference on Embedded networked sensor systems. 162-175,
162-175.
Chao, L. Z. (2011). Multimedia traffic
security architecture for the internet of things. . IEEE Network,,
35-40.
Han, L. G. (2008). A comparative study
into architecture-based safety evaluation methodologies using AADL's error
annex and failure propagation models In 2008 11th IEEE High Assurance Systems
Engineering Symposium. IEEE, 283-292.
M. Suchara, D. X. (2011). Network architecture
for joint failure recovery and traffic engineering. In Proceedings of the ACM
SIGMETRICS joint international conference on Measurement and modeling of
computer systems. ACM, 97-108.
Marlow, P. B. (2010). Maritime security:
an update of key issues. Maritime Policy & Management,, 667-676.
N. Nissim, A. C. (2016). ALDOCX:
detection of unknown malicious microsoft office documents using designated
active learning methods based on new structural feature extraction methodology.
IEEE Transactions on Information Forensics and Security, 631-646.
Salah, K., Calero, J. M., Bernabé, J. B.,
Perez, J. M., & Zeadally, S. (2013). Analyzing the security of Windows 7
and Linux for cloud computing. computers & security. Analyzing the
security of Windows 7 and Linux for cloud computing. computers & security,
113-122.
Stallings, W., Brown, L., Bauer, M. D.,
& Bhattacharjee, A. K. (2012). Computer security: principles and practice. Upper
Saddle River, NJ, USA: Pearson Education., 978.