Haddon, 2020 - Google Patents
Attack Vectors and the Challenge of Preventing Data TheftHaddon, 2020
View PDF- Document ID
- 5491201797326821143
- Author
- Haddon D
- Publication year
- Publication venue
- CYBER SECURITY PRACTITIONER’S GUIDE
External Links
Snippet
As a matter of normal business operations, confidential documents, payment instructions and credit card data need to be exchanged between systems easily and securely. To improve efficiency and reduce costs, governments and local authorities provide portals …
- 230000002155 anti-virotic 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10887330B2 (en) | Data surveillance for privileged assets based on threat streams | |
Yaacoub et al. | Ethical hacking for IoT: Security issues, challenges, solutions and recommendations | |
Saleem et al. | Sok: Anatomy of data breaches | |
Vacca | Network and system security | |
Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
Arogundade | Network security concepts, dangers, and defense best practical | |
Bollinger et al. | Crafting the InfoSec playbook: security monitoring and incident response master plan | |
Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
Dutta et al. | Cyber security: issues and current trends | |
Iakovakis et al. | Analysis and classification of mitigation tools against cyberattacks in COVID‐19 era | |
Nurmi et al. | Tor de-anonymisation techniques | |
Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
Haddon | Attack Vectors and the Challenge of Preventing Data Theft | |
Bendiab et al. | IoT Security Frameworks and Countermeasures | |
Whyte | Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems | |
Maleh | Web application PenTesting: A comprehensive Guide for professionals | |
Dahle | Large scale vulnerability scanning | |
Feagin | The value of cyber security in small business | |
Irwin | Double-edged sword: dual-purpose cyber security methods | |
Bennett et al. | Cyberspace exercises: defending against malicious cyber actors | |
Jahankhani | Cyber Security Practitioner's Guide | |
Jayasekara | Security operations & incident management: Case study analysis | |
Sulkamo | IoT from cyber security perspective | |
Seidl | CompTIA Security+ Practice Tests: Exam SY0-601 | |
Hajdarevic | Cyber Security Audit in Business Environments |