期刊名称:International Journal of Computer Science and Network Security
印刷版ISSN:1738-7906
出版年度:2010
卷号:10
期号:7
页码:224-228
出版社:International Journal of Computer Science and Network Security
摘要:Organizations which are fully computerized and also are linked to outer world through common communication channels are prone to hacker��s attack. Hackers search for vulnerabilities through different techniques such as operating system fingerprinting, stealth scanning etc. And then he or she starts exploiting the same vulnerabilities. Hackers can do the same because the servers have the single operating system for controlling all the functionalities and hardware of the machine. In this paper we are introducing a three layered system for controlling the hardware and functionalities of the servers so that exploiting the vulnerabilities, will become tougher. In this technique we are separating mother board of the server into 3 different layers having their own controlling systems and processors. And the data and the applications are separated in different layers as per there usage and confidentiality. These layers can only interact adjacently. And themiddle layer is the verification layers called Storewel layer.