[go: up one dir, main page]

Haddon, 2020 - Google Patents

Attack Vectors and the Challenge of Preventing Data Theft

Haddon, 2020

View PDF
Document ID
5491201797326821143
Author
Haddon D
Publication year
Publication venue
CYBER SECURITY PRACTITIONER’S GUIDE

External Links

Snippet

As a matter of normal business operations, confidential documents, payment instructions and credit card data need to be exchanged between systems easily and securely. To improve efficiency and reduce costs, governments and local authorities provide portals …
Continue reading at www.worldscientific.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities

Similar Documents

Publication Publication Date Title
US10887330B2 (en) Data surveillance for privileged assets based on threat streams
Yaacoub et al. Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
Saleem et al. Sok: Anatomy of data breaches
Vacca Network and system security
Jang-Jaccard et al. A survey of emerging threats in cybersecurity
Arogundade Network security concepts, dangers, and defense best practical
Bollinger et al. Crafting the InfoSec playbook: security monitoring and incident response master plan
Aboelfotoh et al. A review of cyber-security measuring and assessment methods for modern enterprises
Dutta et al. Cyber security: issues and current trends
Iakovakis et al. Analysis and classification of mitigation tools against cyberattacks in COVID‐19 era
Nurmi et al. Tor de-anonymisation techniques
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Haddon Attack Vectors and the Challenge of Preventing Data Theft
Bendiab et al. IoT Security Frameworks and Countermeasures
Whyte Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems
Maleh Web application PenTesting: A comprehensive Guide for professionals
Dahle Large scale vulnerability scanning
Feagin The value of cyber security in small business
Irwin Double-edged sword: dual-purpose cyber security methods
Bennett et al. Cyberspace exercises: defending against malicious cyber actors
Jahankhani Cyber Security Practitioner's Guide
Jayasekara Security operations & incident management: Case study analysis
Sulkamo IoT from cyber security perspective
Seidl CompTIA Security+ Practice Tests: Exam SY0-601
Hajdarevic Cyber Security Audit in Business Environments