Stoddart, 2022 - Google Patents
Gaining access: attack and defense methods and legacy systemsStoddart, 2022
- Document ID
- 18039452924043692270
- Author
- Stoddart K
- Publication year
- Publication venue
- Cyberwarfare: Threats to critical infrastructure
External Links
Snippet
This chapter is a more technical chapter. It outlines and analyzes a series of cyberattack measures and then discusses counters and defenses. The attacks include the use of zero- days, rootkits, and Remote Access Trojans and remote access more widely and common …
- 238000000034 method 0 abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Diogenes et al. | Cybersecurity–Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals | |
| Wueest | Targeted attacks against the energy sector | |
| Vukalović et al. | Advanced persistent threats-detection and defense | |
| Onyshchenko et al. | Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism | |
| Waheed et al. | Zero-day exploits in cybersecurity: Case studies and countermeasure | |
| Mukherjee | Network Security Strategies: Protect your network and enterprise against advanced cybersecurity attacks and threats | |
| Anisetti et al. | Security threat landscape | |
| Priyadarshini | Introduction on cybersecurity | |
| Bollinger et al. | Crafting the InfoSec playbook: security monitoring and incident response master plan | |
| Peiris et al. | Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks | |
| Rana et al. | Ransomware attacks in cyber-physical systems: Countermeasure of attack vectors through automated web defenses | |
| Sarker et al. | Penetration taxonomy: A systematic review on the penetration process, framework, standards, tools, and scoring methods | |
| Kaushik et al. | Advanced techniques and applications of cybersecurity and forensics | |
| Kamara | Securing Critical Infrastructures | |
| Rawal et al. | Cybersecurity and identity access management | |
| Haber et al. | Asset attack vectors: building effective vulnerability management strategies to protect organizations | |
| Karie et al. | Leveraging artificial intelligence capabilities for real-time monitoring of cybersecurity threats | |
| Stoddart | Gaining access: attack and defense methods and legacy systems | |
| Purkait et al. | Cyber security and frameworks: a study of cyber attacks and methods of prevention of cyber attacks | |
| Bhunia et al. | Analyzing the 2021 kaseya ransomware attack: Combined spearphishing through SonicWall SSLVPN vulnerability | |
| Sehgal et al. | Cybersecurity Blue Team Strategies: Uncover the secrets of blue teams to combat cyber threats in your organization | |
| Almasri | Towards generating a practical SUNBURST attack dataset for network attack detection | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Einler Larsson et al. | Cybersecurity of remote work migration: a study on the VPN security landscape post covid-19 outbreak | |
| Mack | Cyber security |