[go: up one dir, main page]

Goldman, 2010 - Google Patents

Building secure, resilient architectures for cyber mission assurance

Goldman, 2010

View PDF
Document ID
165590091454699904
Author
Goldman H
Publication year

External Links

Snippet

Todays information technology (IT) environments are increasingly subject to escalating cyber attacks. Cyber threats vary widely in sophistication, intent, and the consequences to the targeted systems and networks. The range of attackers extends from users who …
Continue reading at apps.dtic.mil (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
US11347843B2 (en) Asset-based security systems and methods
Bodeau et al. Cyber resiliency engineering aid-the updated cyber resiliency engineering framework and guidance on applying cyber resiliency techniques
Fernandes et al. Security issues in cloud environments: a survey
Lombardi et al. Secure virtualization for cloud computing
JP7185077B2 (en) Methods and Measurable SLA Security and Compliance Platforms to Prevent Root Level Access Attacks
Goldman Building secure, resilient architectures for cyber mission assurance
Abuhussein et al. Evaluating security and privacy in cloud computing services: A Stakeholder's perspective
Ibarra et al. Ransomware impact to SCADA systems and its scope to critical infrastructure
Zineddine Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights
Maynard et al. Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems
Liu Securing the Clouds: Methodologies and Practices
Ravji et al. Integrated intrusion detection and prevention system with honeypot in cloud computing
Atieh Assuring the optimum security level for network, physical and cloud infrastructure
Kajiyama Cloud computing security: how risks and threats are affecting cloud adoption decisions
Cook et al. Managing incident response in the industrial internet of things
Schneider et al. Cyber security maintenance for SCADA systems
Hieb Security hardened remote terminal units for SCADA networks
Salim et al. A Literature Review of Challenges and Solutions in Cloud Security
Whyte Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems
Stawowski Dilemmas of a Security Architect: How to Protect Critical Systems without Disrupting Continuity of Their Services.
Khan Virtual machine security
Sasmal et al. Mutual auditing framework for service level security auditing in cloud
Süß et al. Data Center Security and Resiliency
Stamp et al. Cyber security gap analysis for critical energy systems (CSGACES)
Rao et al. Security 360°: Enterprise security for the cognitive era