Org et al., 2016 - Google Patents
D3. 1-CYBER RISK PATTERNSOrg et al., 2016
View PDF- Document ID
- 17430593047614735530
- Author
- Org L
- Erdogan G
- Refsdal A
- AON A
- Zarzosa S
- Romero A
- Cernivec A
- Aprile G
- Publication year
External Links
Snippet
This report documents the 10 initial risk patterns developed for the WISER framework. A risk pattern in WISER is a generic description of a cyber-attack against cyber systems. The risk patterns are generic in the sense that they apply for systems or aspects of systems with …
- 238000004458 analytical method 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nagpure et al. | Vulnerability assessment and penetration testing of web application | |
Salas et al. | Security testing methodology for vulnerabilities detection of xss in web services and ws-security | |
Nguyen-Tuong et al. | Automatically hardening web applications using precise tainting | |
Kirda et al. | Client-side cross-site scripting protection | |
RU2446459C1 (en) | System and method for checking web resources for presence of malicious components | |
Patel | A survey on vulnerability assessment & penetration testing for secure communication | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Stewart | CompTIA Security+ Review Guide: Exam SY0-601 | |
Spett | Cross-site scripting | |
Meyer et al. | Detecting attacks on web applications from log files | |
Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
Lepofsky | The manager's guide to web application security: a concise guide to the weaker side of the web | |
Bhalme et al. | Cyber attack detection and implementation of prevention methods for web application | |
Fredj | Spheres: an efficient server-side web application protection system | |
Odirichukwu et al. | Security concept in web database development and administration—A review perspective | |
Lin et al. | The automatic defense mechanism for malicious injection attack | |
Abusaimeh et al. | Survey of web application and internet security threats | |
Kothawade et al. | Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment. | |
Martirosyan | Security evaluation of web application vulnerability scanners strengths and limitations using custom web application | |
Yahia | Effective Threat Investigation for SOC Analysts | |
Almi | Web Server Security and Survey on Web Application Security | |
Pevnev et al. | Web application protection technologies | |
Pantoulas | Description, analysis and implementation of a Web Application Firewall (WAF). Creation of attack scenarios and threats prevention | |
Org et al. | D3. 1-CYBER RISK PATTERNS | |
Madhusudhan | Cross channel scripting (xcs) attacks in web applications: Detection and mitigation approaches |