A data transmission classified as secure must be reliably encrypted to prevent execution in memory. A reliable encryption should not involve private or public keys. The secure data is always
transmitted as a file. Therefore, entry into an environment should occur through the OS storage point mentioned earlier. The means of identifying secure data provided through an SSC warrants
tagging within appropriate transmission headers. This would allow endpoint software (ports) to accept or reject inbound transmissions. An operating system would ensure this behavior through
SESR report checks before software installation. Furthermore, the SESR report would reveal any unsafe code execution from an inbound resource not saved as a temporary file.
A summary of elements mentioned so far will now follow. These elements can guarantee code and data security when put in place. The protection against malicious code is twofold. First, any
surreptitious code can be prevented from doing harm through reliable encryption. Any explicit program or software should also be prevented from doing harm to an environment. This is possible
through an operating system applying the SSC protocol to restrict code activity. Furthermore, the presence of a SESR report for corresponding code allows an OS or other software to detect
malicious activity. The appropriate contributions made by operating systems and other software role players can facilitate SESR report accuracy. An operating system can provide system calls
that verify code security through a SESR report.
The operating system plays a crucial role in this proposed approach to digital security. An important feature of the SESR report is that it contains data that can be read easily
by a computer program. These data exist as flags that depict the security states of code. The operating system may read these flags before proceeding with installation, reception
or transfer of software. The option of checking for such flags could be added to OS configuration settings. An operating system may also check these flags completely rather than set
their detection as options. The flag checking operations intrinsically have a negligible effect on performance.
|