[go: up one dir, main page]

de Oliveira Pinho, 2021 - Google Patents

OrchRecon A Distributed System for Reconnaissance and Vulnerability Scanning

de Oliveira Pinho, 2021

View PDF
Document ID
12532147752901003398
Author
de Oliveira Pinho V
Publication year
Publication venue
PQDT-Global

External Links

Snippet

Nowadays there are a myriad of available tools to perform a penetration testing or a vulnerability assessment. While some of them focus on doing a single task, others combine the former in order to achieve better results. This approach, however more timeconsuming …
Continue reading at repositorio-aberto.up.pt (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
US10169571B1 (en) System and method for secure, policy-based access control for mobile computing devices
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
CN114467282A (en) Detect and prevent malicious script attacks using behavioral analysis of runtime script execution events
US20230319092A1 (en) Offline Workflows In An Edge-Based Data Platform
US20230247040A1 (en) Techniques for cloud detection and response from cloud logs utilizing a security graph
Berlato A Security Service for Performance-Aware End-to-End Protection of Sensitive Data in Cloud Native Applications
Choi et al. Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild
Väisänen Security review of cloud application architectures
de Oliveira Pinho OrchRecon A Distributed System for Reconnaissance and Vulnerability Scanning
Habbal Enhancing availability of microservice architecture: a case study on Kubernetes security configurations
Kothawade et al. Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment.
Azarmi End-to-end security in service-oriented architecture
Ramirez A framework to build secure microservice architecture
Brucker-Hahn et al. CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments
Tai Ramirez A Framework To Build Secure Microservice Architecture
Bufalino et al. Inside Job: Defending Kubernetes Clusters Against Network Misconfigurations
US12487804B2 (en) Controlling deployment of software applications based on evaluated risk of exposure of designated types of data
DOHNAL Microservices for Automated Threat Response to Phishing
Chandramouli et al. Guidelines for API Protection for Cloud-Native Systems
Chaves Hardening an Open-Source Governance Risk and Compliance Software: Eramba
Iacobuț et al. Security Analysis and Architecture of a Blazor-Based Web Application
Salutt et al. API Security Lab
Yergaliyev Continuous security testing for an existing client-server application
Hussain Evaluation of Open-Source Vulnerability Scanners for Web Applications and WordPress Websites
Sarıkoz An Information security framework for web services in enterprise networks