Parvanov et al., 2022 - Google Patents
Threat modelling and vulnerability assessment for IoT solutions: a case studyParvanov et al., 2022
View PDF- Document ID
- 5754225669196136379
- Author
- Parvanov K
- Tsagkidis C
- Publication year
External Links
Snippet
The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their …
- 238000000034 method 0 abstract description 109
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Force et al. | Security and privacy controls for federal information systems and organizations | |
Allen et al. | Kali Linux–Assuring security by penetration testing | |
US11895121B1 (en) | Efficient identification and remediation of excessive privileges of identity and access management roles and policies | |
Chung et al. | Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement | |
Ali et al. | Backtrack 4: Assuring security by penetration testing | |
Hermann et al. | A taxonomy of functional security features and how they can be located | |
Buja | Cybersecurity of Industrial Internet of Things (IIoT) | |
Parvanov et al. | Threat modelling and vulnerability assessment for IoT solutions: a case study | |
Modderkolk | Zero trust maturity matters: Modeling cyber security focus areas and maturity levels in the zero trust principle | |
Shahi | Tactics, techniques and procedures (ttps) to augment cyber threat intelligence (cti): A comprehensive study | |
Erdıvan | Process, Technology and Human Aspects of a Security Operations Center | |
Cambric et al. | Cloud Auditing Best Practices | |
Shokunbi et al. | Emerging Security Threat in the SOLC and Mitigations | |
Vasenius | Best practices in cloud-based Penetration Testing | |
Gandini | Development of Incident Response Playbooks and Runbooks for Amazon Web Services Ransomware Scenarios | |
LO GIUDICE | Methodologies and tools for a vulnerability management process with an integrated risk evaluation framework | |
Munasinghe | Advancements in Digital Forensics Acquisition by Design and Artifact Database for Storing Evidence from IoT Devices | |
Leffell | Strategies for Proper Security Practices in Small Financial Institutions | |
Hartenstein et al. | Empirical Analysis of Trustworthiness Attributes in the Context of Digitization | |
Nilsson et al. | External Threat Assessment and Internal Network Security Evaluation: A Penetration Test and Vulnerability Analysis of IVA’s Internal Infrastructure Against External Threats | |
Münker | Automation of security policies in software systems | |
Voltan et al. | A Cybersecurity Framework for Scientific Research Infrastructure: the CERIC-ERIC Case Study | |
Steenbrink | Zero Trust Architecture | |
Guliev et al. | Offensive Strategies for Identifying Cloud Security | |
Maleh | Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking |