An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection

06/13/2023
by   Hakan Temiz, et al.
0

In organizations, employees work with information stored in files according to their duties and responsibilities. Windows uses resource-based access permissions that any permission for any user has to be set separately per resource. This approach gets complicated as the number of resources and users increase, and causes oversights in assigning permissions. Therefore, a special mechanism is required to scrutinize what permissions any employee has on any set of resources. This requirement is circumvented by reversing the Windows approach in terms of user-accessible resources. This approach is implemented by a program allowing quick and easy examination of any type of permissions granted or denied to active directory users on any folder. In this way, administrators can make sure there is no any missing or overlooked setting that could cause a security vulnerability. This approach can easily be extended to scrutinize other resources, and for other local or active directory objects.

READ FULL TEXT
research
09/19/2022

Automated Implementation of Windows-related Security-Configuration Guides

Hardening is the process of configuring IT systems to ensure the securit...
research
02/28/2020

Forensic analysis of the Windows telemetry for diagnostics

Telemetry is the automated sensing and collection of data from a remote ...
research
05/23/2019

MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel

Windows OS kernel memory is one of the main targets of cyber-attacks. By...
research
06/10/2021

Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again

The security of a computer system depends on OS kernel protection. It is...
research
08/13/2016

Duplication of Windows Services

OS-level virtualization techniques virtualize system resources at the sy...
research
01/01/2021

Interface Features and Users' Well-Being: Measuring the Sensitivity of Users' Well-Being to Resource Constraints and Feature Types

Users increasingly face multiple interface features on one hand, and con...
research
02/07/2022

Ransomware: Analysing the Impact on Windows Active Directory Domain Services

Ransomware has become an increasingly popular type of malware across the...

Please sign up or login with your details

Forgot password? Click here to reset