[go: up one dir, main page]

Gunawan et al., 2018 - Google Patents

On the review and setup of security audit using Kali Linux

Gunawan et al., 2018

View PDF
Document ID
17087305403821183305
Author
Gunawan T
Lim M
Zulkurnain N
Kartiwi M
Publication year
Publication venue
Indonesian Journal of Electrical Engineering and Computer Science

External Links

Snippet

The massive development of technology especially in computers, mobile devices, and networking has bring security issue forward as primarily concern. The computers and mobile devices connected to Internet are exposed to numerous threats and exploits. With the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
Moustafa et al. Federated TON_IoT Windows datasets for evaluating AI-based security applications
Sharma et al. Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures
Moustafa et al. Data analytics-enabled intrusion detection: Evaluations of ToN_IoT linux datasets
US11483318B2 (en) Providing network security through autonomous simulated environments
US9571517B2 (en) Synthetic cyber-risk model for vulnerability determination
Gunawan et al. On the review and setup of security audit using Kali Linux
CN106713365A (en) Cloud environment-based network security system
Waheed et al. Zero-day exploits in cybersecurity: Case studies and countermeasure
Aboelfotoh et al. A review of cyber-security measuring and assessment methods for modern enterprises
US11805147B2 (en) Domain-specific language simulant for simulating a threat-actor and adversarial tactics, techniques, and procedures
Al-Mohannadi et al. Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence
Kaushik et al. Advanced techniques and applications of cybersecurity and forensics
Barik et al. An exploration of attack patterns and protection approaches using penetration testing
Alsmadi Cyber threat analysis
US20240303344A1 (en) Methods, systems, and computer readable media for breach and attack simulation
Kim et al. Research on security threats using vpn in zero trust environments
Alosefer Analysing web-based malware behaviour through client honeypots
Gupta Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
Peltola Threat Detection Analysis Using MITRE ATT&CK Framework
Dragusin et al. Emerging Cybersecurity Threats in Embedded Systems: A Review of Attack Techniques, Anomaly Detection, and AI-Based Prediction Approaches
Scarfò et al. Prevention of cyber-attacks and privacy breaches in healthcare sector
Sharma et al. Penetration testing in application using testng tool
Myllylä Detecting cyber attacks in time: combining attack simulation with detection logic
Rantanen Attracting the APT actors into deception system: identifying ways to attract an APT actor
Panagiotakopoulos Assessing open and closed EDRs