SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
SCENARIO
                                                                                                                                        RAPID RECOVERY SYSTEM                                                                                                                                                    Virtual Machine Appliances (VMAs) are one or more 
                                                                                                                                                                                                                                                                                                                 applications logically grouped into Virtual Machines. 
 John is a typical desktop computer user that uses his computer to 
 communicate with friends on IM and email, and surf the web.
                                                                                                                                                                               Todd Deshane                                                                                                                      VMAs specify the network resources and files that 
                                                                                                                                                                                                                                                                                                                 they need to access, the permissions on them, and 
                                                                                                                                                                             Clarkson University                                                                                                                 the rate at which they expect to use them. 
                                Ooooh! I got some pics from my buddy 
                                                Joe :)
                                                                                                                                                                                         SYSTEM ARCHITECTURE
                                                                                                                                                                                                                                                                                                        The File System Virtual Machine (FS­VM) stores and 
                                                                                                                                       Domain 0 (dom0) is the 
                                                                                                                                                                                                                                                                                                        protects the user's data. Access to the files is limited 
                                                                                                                                       privileged VM in Xen. It 
                                                                                                                                                                                                                                                                                                        to only those specific VMAs that need it. Backing up 
                                                                                                                                       manages VM resources and 
                                                                                                                                                                                                                                                                                                        the FS­VM backs up all of the user's important data at 
                                                                                                                                       also the starting, stopping, 
                                                                                                                                                                                                                                                                                                        one time.
 Without the Rapid Recovery System
                                                                                                                                       and restarting of VMs.


John didn't know that the pics were actually a trojan, and now his 
computer is part of a botnet that is sharing all of his personal information                                                                                                                                                                                                                                     The Network Virtual Machine (NET­VM) is given 
to the world.                                                                                                                                                                                                                                                                                                    direct and exclusive access to the network interface 
                                                                                                                                                                                                                                                                                                                 card (NIC). The NET­VM has a built­in firewall and 
                010010000100000101000011010010110100010101000100                                                                                                                                                                                                                                                 intrusion detection system. It monitors and enforces 
                   Credit Card Numbers, Email Contacts,                                                                                                                                                                                                                                                          the network resources that the VMAs use.  
                   Passwords




                                                                                Not only is John's information being                THE MINEFIELD OF PERSONAL COMPUTER USE                                                                                                                                            SYSTEM PERFORMANCE
                                                                                taken, but his computer resources are 
                                                                                being used to spread this trojan and 
                                                                                                                                     The seemingly innocent things you can do to render your PC unusable
                                                                                other viruses to other vulnerable 
                                                                                computers on the Internet.
                                                                                                                                    Scenario: Open an attachment containing a mass emailing virus
                                                                                                                                                           Without the Rapid Recovery System                                                      With the Rapid Recovery System
                                                                                                                                    Notice a slow down of the machine, unsure of cause.                                   The attachment is written into the email log. 
                                                                                                                                    Reboot machine, still slow.                                                           The NET­VM flags a violation of the network contract and pauses the VM.
                                                                                          A few hours later, John has re­
                                                                                                                                    Look in process list, attempt to kill suspicious process, regenerates itself.         The system asks the user if they want to rollback to the last known good image.
                                                                                          installed his operating system and all 
    John notices that his computer is                                                                                               Call tech support, make an appointment to take the computer into the shop.            Rollback and remount personal data store.
                                                                                          of his applications that he uses. He 
    running slower than usual. He is told that                                                                                      3 weeks later get the machine back with the OS re­installed.                          Some system data (logs, etc.) in VM appliance is lost, but no personal data is lost.
                                                                                          forgot to back up some digital photos 
    he should wipe his computer and re­                                                                                             Newest backup is 1 month old, some recent reports and pictures lost.                  The machine is back in working order in less than 1 hour.
                                                                                          that he took of his daughter's play. 
    install. He will need to find his operating                                           Ooops! But at least his computer is 
    system and application install CDs.                                                   working again, right?


                                                                                                                                    Scenario: Surf to the wrong web site
      With the Rapid Recovery System                                                                                                                        Without the Rapid Recovery System
                                                                                                                                    A malicious program begins to read over the hard drive for credit card numbers.
                                                                                                                                                                                                                                                  With the Rapid Recovery System
                                                                                                                                                                                                                          A malicious program begins to read over the hard drive for credit card numbers.
                                                                                                                                    The user does not notice any signs of trouble.                                        The FS­VM triggers a violation of the data access contract and pauses the VM.
                                                                                                                                    The program sends out a small amout of data containing the information discovered.    The system asks the user if they want to rollback to the last known good image.
                                                                                                                                    The program installs a backdoor for later use by the attacker.                        Rollback and remount personal data store.
                                                                                                                                                                                                                          The scan is not completed, the information is not sent, the backdoor is prevented.


                                                   John really wants to see the 
                                                   pics, so he ignores the error 
                                                                                                  Either of these actions cause 
                                                   and copies the “pics” to his 
                                                                                                  the Internet VM to be reset.      Scenario: Install a required software update
 John tries to load the pictures in his photo      Internet VM and clicks on them. 
                                                                                                  The built­in firewall of the                            Without the Rapid Recovery System                                                      With the Rapid Recovery System
 VM, but the action is denied, since the           The executable runs and it 
                                                                                                  Rapid Recovery System             After the update, several applications cannot find some required components.          After the update, several applications cannot find some required components.
 “pics” are actually executables. An error         instantly tries to run its built­in 
                                                                                                  disallows the Internet VM to      The user calls tech support and they confirm the problems with this patch.            The user calls tech support and they confirm the problems with this patch.
 message is displayed to John.                     IRC server and starts scanning 
                                                                                                  create a server. An error         The best recommendation is to completely uninstall and re­install the applications.   The user decides to rollback to the last known good image.
                                                   for personal data.
                                                                                                  message appears when the          It takes a few hours to assemble the installation media, to find the product keys,    The machine is back up and running in minutes.
                                                                                                  Internet restarts. John finds     and to follow the instructions.
                                                                                                  out that these were not pics. 

Más contenido relacionado

Más de Todd Deshane

Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)Todd Deshane
 
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)Todd Deshane
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane
 
Computer Security for Mission Assurance
Computer Security for Mission AssuranceComputer Security for Mission Assurance
Computer Security for Mission AssuranceTodd Deshane
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622Todd Deshane
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622Todd Deshane
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809Todd Deshane
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809Todd Deshane
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207Todd Deshane
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207Todd Deshane
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426Todd Deshane
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426Todd Deshane
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207Todd Deshane
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207Todd Deshane
 
Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Todd Deshane
 
Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Todd Deshane
 

Más de Todd Deshane (20)

Usenix04 20040702
Usenix04 20040702Usenix04 20040702
Usenix04 20040702
 
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (PDF)
 
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
Open Source Cloud Computing: Practical Solutions For Your Online Presence (ODP)
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
Computer Security for Mission Assurance
Computer Security for Mission AssuranceComputer Security for Mission Assurance
Computer Security for Mission Assurance
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622
 
S4 xen hypervisor_20080622
S4 xen hypervisor_20080622S4 xen hypervisor_20080622
S4 xen hypervisor_20080622
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809
 
Ph d proposal_20070809
Ph d proposal_20070809Ph d proposal_20070809
Ph d proposal_20070809
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426
 
Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207
 
Cs seminar 20061207
Cs seminar 20061207Cs seminar 20061207
Cs seminar 20061207
 
Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808
 
Atc ny friday-talk_20080808
Atc ny friday-talk_20080808Atc ny friday-talk_20080808
Atc ny friday-talk_20080808
 
2010 xen-lisa
2010 xen-lisa2010 xen-lisa
2010 xen-lisa
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Csaw research poster_20071204

  • 1. SCENARIO RAPID RECOVERY SYSTEM Virtual Machine Appliances (VMAs) are one or more  applications logically grouped into Virtual Machines.  John is a typical desktop computer user that uses his computer to  communicate with friends on IM and email, and surf the web. Todd Deshane VMAs specify the network resources and files that  they need to access, the permissions on them, and  Clarkson University the rate at which they expect to use them.  Ooooh! I got some pics from my buddy  Joe :) SYSTEM ARCHITECTURE The File System Virtual Machine (FS­VM) stores and  Domain 0 (dom0) is the  protects the user's data. Access to the files is limited  privileged VM in Xen. It  to only those specific VMAs that need it. Backing up  manages VM resources and  the FS­VM backs up all of the user's important data at  also the starting, stopping,  one time. Without the Rapid Recovery System and restarting of VMs. John didn't know that the pics were actually a trojan, and now his  computer is part of a botnet that is sharing all of his personal information  The Network Virtual Machine (NET­VM) is given  to the world. direct and exclusive access to the network interface  card (NIC). The NET­VM has a built­in firewall and  010010000100000101000011010010110100010101000100 intrusion detection system. It monitors and enforces  Credit Card Numbers, Email Contacts,  the network resources that the VMAs use.   Passwords Not only is John's information being  THE MINEFIELD OF PERSONAL COMPUTER USE SYSTEM PERFORMANCE taken, but his computer resources are  being used to spread this trojan and   The seemingly innocent things you can do to render your PC unusable other viruses to other vulnerable  computers on the Internet. Scenario: Open an attachment containing a mass emailing virus Without the Rapid Recovery System With the Rapid Recovery System Notice a slow down of the machine, unsure of cause. The attachment is written into the email log.  Reboot machine, still slow. The NET­VM flags a violation of the network contract and pauses the VM. A few hours later, John has re­ Look in process list, attempt to kill suspicious process, regenerates itself. The system asks the user if they want to rollback to the last known good image. installed his operating system and all  John notices that his computer is  Call tech support, make an appointment to take the computer into the shop. Rollback and remount personal data store. of his applications that he uses. He  running slower than usual. He is told that  3 weeks later get the machine back with the OS re­installed. Some system data (logs, etc.) in VM appliance is lost, but no personal data is lost. forgot to back up some digital photos  he should wipe his computer and re­ Newest backup is 1 month old, some recent reports and pictures lost.   The machine is back in working order in less than 1 hour. that he took of his daughter's play.  install. He will need to find his operating  Ooops! But at least his computer is  system and application install CDs.  working again, right? Scenario: Surf to the wrong web site With the Rapid Recovery System Without the Rapid Recovery System A malicious program begins to read over the hard drive for credit card numbers. With the Rapid Recovery System A malicious program begins to read over the hard drive for credit card numbers. The user does not notice any signs of trouble. The FS­VM triggers a violation of the data access contract and pauses the VM. The program sends out a small amout of data containing the information discovered. The system asks the user if they want to rollback to the last known good image. The program installs a backdoor for later use by the attacker. Rollback and remount personal data store. The scan is not completed, the information is not sent, the backdoor is prevented. John really wants to see the  pics, so he ignores the error  Either of these actions cause  and copies the “pics” to his  the Internet VM to be reset.  Scenario: Install a required software update John tries to load the pictures in his photo  Internet VM and clicks on them.  The built­in firewall of the  Without the Rapid Recovery System With the Rapid Recovery System VM, but the action is denied, since the  The executable runs and it  Rapid Recovery System  After the update, several applications cannot find some required components. After the update, several applications cannot find some required components. “pics” are actually executables. An error  instantly tries to run its built­in  disallows the Internet VM to  The user calls tech support and they confirm the problems with this patch. The user calls tech support and they confirm the problems with this patch. message is displayed to John. IRC server and starts scanning  create a server. An error  The best recommendation is to completely uninstall and re­install the applications. The user decides to rollback to the last known good image. for personal data. message appears when the  It takes a few hours to assemble the installation media, to find the product keys,  The machine is back up and running in minutes. Internet restarts. John finds  and to follow the instructions. out that these were not pics.