Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/7605
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nair, Dilip C | - |
dc.date.accessioned | 2017-07-26T05:46:41Z | - |
dc.date.available | 2017-07-26T05:46:41Z | - |
dc.date.issued | 2017-05 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/7605 | - |
dc.description.abstract | Security does not like complexity. With increasing Lines of Code (LoC) for any system, the complexity of incorporating security increases. Hence, Windows Operating Systems is more vulnerable than any other operating system. The main objective of this system is to restrict the Windows operating system to work in an unexploitable condition. We achieve this by imposing restrictions to the OS and monitor continuously for the violation of these restrictions. To decide how much restrictions is required we can divide the OS into three types, they are Productive Systems, Non-Productive Systems and Hybrid Systems. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 15MCEI05; | - |
dc.subject | Computer 2017 | en_US |
dc.subject | Project Report 2017 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 15MCEI | en_US |
dc.subject | 15MCEI05 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2017 | en_US |
dc.subject | CE (INS) | en_US |
dc.title | Restriction Based System to Detect Malicious Activities in Windows OS | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
15MCEI05.pdf | 15MCEI05 | 2.36 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.