[go: up one dir, main page]

Stoddart, 2022 - Google Patents

Gaining access: attack and defense methods and legacy systems

Stoddart, 2022

Document ID
18039452924043692270
Author
Stoddart K
Publication year
Publication venue
Cyberwarfare: Threats to critical infrastructure

External Links

Snippet

This chapter is a more technical chapter. It outlines and analyzes a series of cyberattack measures and then discusses counters and defenses. The attacks include the use of zero- days, rootkits, and Remote Access Trojans and remote access more widely and common …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Diogenes et al. Cybersecurity–Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals
Wueest Targeted attacks against the energy sector
Vukalović et al. Advanced persistent threats-detection and defense
Onyshchenko et al. Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism
Waheed et al. Zero-day exploits in cybersecurity: Case studies and countermeasure
Mukherjee Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats
Anisetti et al. Security threat landscape
Priyadarshini Introduction on cybersecurity
Bollinger et al. Crafting the InfoSec playbook: security monitoring and incident response master plan
Peiris et al. Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
Rana et al. Ransomware attacks in cyber-physical systems: Countermeasure of attack vectors through automated web defenses
Sarker et al. Penetration taxonomy: A systematic review on the penetration process, framework, standards, tools, and scoring methods
Kaushik et al. Advanced techniques and applications of cybersecurity and forensics
Kamara Securing Critical Infrastructures
Rawal et al. Cybersecurity and identity access management
Haber et al. Asset attack vectors: building effective vulnerability management strategies to protect organizations
Karie et al. Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats
Stoddart Gaining access: attack and defense methods and legacy systems
Purkait et al. Cyber security and frameworks: a study of cyber attacks and methods of prevention of cyber attacks
Bhunia et al. Analyzing the 2021 kaseya ransomware attack: Combined spearphishing through SonicWall SSLVPN vulnerability
Sehgal et al. Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization
Almasri Towards generating a practical SUNBURST attack dataset for network attack detection
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Einler Larsson et al. Cybersecurity of remote work migration: a study on the VPN security landscape post covid-19 outbreak
Mack Cyber security