[go: up one dir, main page]

Parvanov et al., 2022 - Google Patents

Threat modelling and vulnerability assessment for IoT solutions: a case study

Parvanov et al., 2022

View PDF
Document ID
5754225669196136379
Author
Parvanov K
Tsagkidis C
Publication year

External Links

Snippet

The cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their …
Continue reading at gupea.ub.gu.se (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis

Similar Documents

Publication Publication Date Title
Force et al. Security and privacy controls for federal information systems and organizations
Allen et al. Kali Linux–Assuring security by penetration testing
US11895121B1 (en) Efficient identification and remediation of excessive privileges of identity and access management roles and policies
Chung et al. Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement
Ali et al. Backtrack 4: Assuring security by penetration testing
Hermann et al. A taxonomy of functional security features and how they can be located
Buja Cybersecurity of Industrial Internet of Things (IIoT)
Parvanov et al. Threat modelling and vulnerability assessment for IoT solutions: a case study
Modderkolk Zero trust maturity matters: Modeling cyber security focus areas and maturity levels in the zero trust principle
Shahi Tactics, techniques and procedures (ttps) to augment cyber threat intelligence (cti): A comprehensive study
Erdıvan Process, Technology and Human Aspects of a Security Operations Center
Cambric et al. Cloud Auditing Best Practices
Shokunbi et al. Emerging Security Threat in the SOLC and Mitigations
Vasenius Best practices in cloud-based Penetration Testing
Gandini Development of Incident Response Playbooks and Runbooks for Amazon Web Services Ransomware Scenarios
LO GIUDICE Methodologies and tools for a vulnerability management process with an integrated risk evaluation framework
Munasinghe Advancements in Digital Forensics Acquisition by Design and Artifact Database for Storing Evidence from IoT Devices
Leffell Strategies for Proper Security Practices in Small Financial Institutions
Hartenstein et al. Empirical Analysis of Trustworthiness Attributes in the Context of Digitization
Nilsson et al. External Threat Assessment and Internal Network Security Evaluation: A Penetration Test and Vulnerability Analysis of IVA’s Internal Infrastructure Against External Threats
Münker Automation of security policies in software systems
Voltan et al. A Cybersecurity Framework for Scientific Research Infrastructure: the CERIC-ERIC Case Study
Steenbrink Zero Trust Architecture
Guliev et al. Offensive Strategies for Identifying Cloud Security
Maleh Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking