Security framework for storage protection against malware attacks on hosts |
 |
Recommendation ITU-T X.1220 provides a framework for the protection of storage against malware attacks on hosts, which bypass network protection and endpoint protection. The framework also considers attacks caused by human errors or social engineering. The framework consists of a host and a storage protection server. The storage protection server works separately from the host, stores data in the storage, and provides a network drive to the host.
When an application on the host requests data, the storage protection server provides real data or fake data depending on whether the application is listed or not in a pre-registered application list that is managed on the storage protection server with the objective of protecting data in the storage against malware attacks that encrypt, tamper, or steal data. The storage protection server allows pre-registered applications to create, modify or delete data in the storage while preventing other applications from performing those operations. It provides pre-registered applications with read-write access to real data from the storage, and non-registered applications with read-only access to fake data. In addition, there is synergy if the framework is applied together with network protection and endpoint protection, as they provide different types of protection.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/15709 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1200-X.1229: Cybersecurity |
Approval date: |
2023-11-13 |
Provisional name: | X.spmoh |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1220 (11/2023)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|