Goldman, 2010 - Google Patents
Building secure, resilient architectures for cyber mission assuranceGoldman, 2010
View PDF- Document ID
- 165590091454699904
- Author
- Goldman H
- Publication year
External Links
Snippet
Todays information technology (IT) environments are increasingly subject to escalating cyber attacks. Cyber threats vary widely in sophistication, intent, and the consequences to the targeted systems and networks. The range of attackers extends from users who …
- 238000003327 Mission assurance 0 title description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11347843B2 (en) | Asset-based security systems and methods | |
Bodeau et al. | Cyber resiliency engineering aid-the updated cyber resiliency engineering framework and guidance on applying cyber resiliency techniques | |
Fernandes et al. | Security issues in cloud environments: a survey | |
Lombardi et al. | Secure virtualization for cloud computing | |
JP7185077B2 (en) | Methods and Measurable SLA Security and Compliance Platforms to Prevent Root Level Access Attacks | |
Goldman | Building secure, resilient architectures for cyber mission assurance | |
Abuhussein et al. | Evaluating security and privacy in cloud computing services: A Stakeholder's perspective | |
Ibarra et al. | Ransomware impact to SCADA systems and its scope to critical infrastructure | |
Zineddine | Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights | |
Maynard et al. | Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems | |
Liu | Securing the Clouds: Methodologies and Practices | |
Ravji et al. | Integrated intrusion detection and prevention system with honeypot in cloud computing | |
Atieh | Assuring the optimum security level for network, physical and cloud infrastructure | |
Kajiyama | Cloud computing security: how risks and threats are affecting cloud adoption decisions | |
Cook et al. | Managing incident response in the industrial internet of things | |
Schneider et al. | Cyber security maintenance for SCADA systems | |
Hieb | Security hardened remote terminal units for SCADA networks | |
Salim et al. | A Literature Review of Challenges and Solutions in Cloud Security | |
Whyte | Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems | |
Stawowski | Dilemmas of a Security Architect: How to Protect Critical Systems without Disrupting Continuity of Their Services. | |
Khan | Virtual machine security | |
Sasmal et al. | Mutual auditing framework for service level security auditing in cloud | |
Süß et al. | Data Center Security and Resiliency | |
Stamp et al. | Cyber security gap analysis for critical energy systems (CSGACES) | |
Rao et al. | Security 360°: Enterprise security for the cognitive era |