[go: up one dir, main page]

Org et al., 2016 - Google Patents

D3. 1-CYBER RISK PATTERNS

Org et al., 2016

View PDF
Document ID
17430593047614735530
Author
Org L
Erdogan G
Refsdal A
AON A
Zarzosa S
Romero A
Cernivec A
Aprile G
Publication year

External Links

Snippet

This report documents the 10 initial risk patterns developed for the WISER framework. A risk pattern in WISER is a generic description of a cyber-attack against cyber systems. The risk patterns are generic in the sense that they apply for systems or aspects of systems with …
Continue reading at gencer.no (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Similar Documents

Publication Publication Date Title
Nagpure et al. Vulnerability assessment and penetration testing of web application
Salas et al. Security testing methodology for vulnerabilities detection of xss in web services and ws-security
Nguyen-Tuong et al. Automatically hardening web applications using precise tainting
Kirda et al. Client-side cross-site scripting protection
RU2446459C1 (en) System and method for checking web resources for presence of malicious components
Patel A survey on vulnerability assessment & penetration testing for secure communication
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Stewart CompTIA Security+ Review Guide: Exam SY0-601
Spett Cross-site scripting
Meyer et al. Detecting attacks on web applications from log files
Kollepalli et al. An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications.
Lepofsky The manager's guide to web application security: a concise guide to the weaker side of the web
Bhalme et al. Cyber attack detection and implementation of prevention methods for web application
Fredj Spheres: an efficient server-side web application protection system
Odirichukwu et al. Security concept in web database development and administration—A review perspective
Lin et al. The automatic defense mechanism for malicious injection attack
Abusaimeh et al. Survey of web application and internet security threats
Kothawade et al. Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment.
Martirosyan Security evaluation of web application vulnerability scanners strengths and limitations using custom web application
Yahia Effective Threat Investigation for SOC Analysts
Almi Web Server Security and Survey on Web Application Security
Pevnev et al. Web application protection technologies
Pantoulas Description, analysis and implementation of a Web Application Firewall (WAF). Creation of attack scenarios and threats prevention
Org et al. D3. 1-CYBER RISK PATTERNS
Madhusudhan Cross channel scripting (xcs) attacks in web applications: Detection and mitigation approaches