Gunawan et al., 2018 - Google Patents
On the review and setup of security audit using Kali LinuxGunawan et al., 2018
View PDF- Document ID
- 17087305403821183305
- Author
- Gunawan T
- Lim M
- Zulkurnain N
- Kartiwi M
- Publication year
- Publication venue
- Indonesian Journal of Electrical Engineering and Computer Science
External Links
Snippet
The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the …
- 241001397173 Kali <angiosperm> 0 title abstract description 45
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Moustafa et al. | Federated TON_IoT Windows datasets for evaluating AI-based security applications | |
| Sharma et al. | Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures | |
| Moustafa et al. | Data analytics-enabled intrusion detection: Evaluations of ToN_IoT linux datasets | |
| US11483318B2 (en) | Providing network security through autonomous simulated environments | |
| US9571517B2 (en) | Synthetic cyber-risk model for vulnerability determination | |
| Gunawan et al. | On the review and setup of security audit using Kali Linux | |
| CN106713365A (en) | Cloud environment-based network security system | |
| Waheed et al. | Zero-day exploits in cybersecurity: Case studies and countermeasure | |
| Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
| US11805147B2 (en) | Domain-specific language simulant for simulating a threat-actor and adversarial tactics, techniques, and procedures | |
| Al-Mohannadi et al. | Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence | |
| Kaushik et al. | Advanced techniques and applications of cybersecurity and forensics | |
| Barik et al. | An exploration of attack patterns and protection approaches using penetration testing | |
| Alsmadi | Cyber threat analysis | |
| US20240303344A1 (en) | Methods, systems, and computer readable media for breach and attack simulation | |
| Kim et al. | Research on security threats using vpn in zero trust environments | |
| Alosefer | Analysing web-based malware behaviour through client honeypots | |
| Gupta | Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh | |
| Peltola | Threat Detection Analysis Using MITRE ATT&CK Framework | |
| Dragusin et al. | Emerging Cybersecurity Threats in Embedded Systems: A Review of Attack Techniques, Anomaly Detection, and AI-Based Prediction Approaches | |
| Scarfò et al. | Prevention of cyber-attacks and privacy breaches in healthcare sector | |
| Sharma et al. | Penetration testing in application using testng tool | |
| Myllylä | Detecting cyber attacks in time: combining attack simulation with detection logic | |
| Rantanen | Attracting the APT actors into deception system: identifying ways to attract an APT actor | |
| Panagiotakopoulos | Assessing open and closed EDRs |