de Oliveira Pinho, 2021 - Google Patents
OrchRecon A Distributed System for Reconnaissance and Vulnerability Scanningde Oliveira Pinho, 2021
View PDF- Document ID
- 12532147752901003398
- Author
- de Oliveira Pinho V
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
Nowadays there are a myriad of available tools to perform a penetration testing or a vulnerability assessment. While some of them focus on doing a single task, others combine the former in order to achieve better results. This approach, however more timeconsuming …
- 238000012360 testing method 0 abstract description 124
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10169571B1 (en) | System and method for secure, policy-based access control for mobile computing devices | |
| Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
| CN114467282A (en) | Detect and prevent malicious script attacks using behavioral analysis of runtime script execution events | |
| US20230319092A1 (en) | Offline Workflows In An Edge-Based Data Platform | |
| US20230247040A1 (en) | Techniques for cloud detection and response from cloud logs utilizing a security graph | |
| Berlato | A Security Service for Performance-Aware End-to-End Protection of Sensitive Data in Cloud Native Applications | |
| Choi et al. | Uncovering Threats in Container Systems: A Study on Misconfigured Container Components in the Wild | |
| Väisänen | Security review of cloud application architectures | |
| de Oliveira Pinho | OrchRecon A Distributed System for Reconnaissance and Vulnerability Scanning | |
| Habbal | Enhancing availability of microservice architecture: a case study on Kubernetes security configurations | |
| Kothawade et al. | Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment. | |
| Azarmi | End-to-end security in service-oriented architecture | |
| Ramirez | A framework to build secure microservice architecture | |
| Brucker-Hahn et al. | CloudCover: Enforcement of Multi-Hop Network Connections in Microservice Deployments | |
| Tai Ramirez | A Framework To Build Secure Microservice Architecture | |
| Bufalino et al. | Inside Job: Defending Kubernetes Clusters Against Network Misconfigurations | |
| US12487804B2 (en) | Controlling deployment of software applications based on evaluated risk of exposure of designated types of data | |
| DOHNAL | Microservices for Automated Threat Response to Phishing | |
| Chandramouli et al. | Guidelines for API Protection for Cloud-Native Systems | |
| Chaves | Hardening an Open-Source Governance Risk and Compliance Software: Eramba | |
| Iacobuț et al. | Security Analysis and Architecture of a Blazor-Based Web Application | |
| Salutt et al. | API Security Lab | |
| Yergaliyev | Continuous security testing for an existing client-server application | |
| Hussain | Evaluation of Open-Source Vulnerability Scanners for Web Applications and WordPress Websites | |
| Sarıkoz | An Information security framework for web services in enterprise networks |