[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Park et al., 2019 - Google Patents

Development of incident response tool for cyber security training based on virtualization and cloud

Park et al., 2019

Document ID
6928121559777667243
Author
Park Y
Choi C
Jang C
Shin D
Cho G
Kim H
Publication year
Publication venue
2019 International Workshop on Big Data and Information Security (IWBIS)

External Links

Snippet

We developed a virtualization-based infringement incident response tool for cyber security training system using Cloud. This tool was developed by applying the concept of attack and defense which is the basic of military war game modeling and simulation. The main purpose …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2207/00Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F2207/72Indexing scheme relating to groups G06F7/72 - G06F7/729
    • G06F2207/7219Countermeasures against side channel or fault attacks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models

Similar Documents

Publication Publication Date Title
Aldawood et al. An academic review of current industrial and commercial cyber security social engineering solutions
Kick Cyber exercise playbook
Sharma et al. Teaching information systems security courses: A hands-on approach
Kavak et al. A characterization of cybersecurity simulation scenarios.
Ashley et al. Gamification of cybersecurity for workforce development in critical infrastructure
Couretas An introduction to cyber modeling and simulation
Rieb et al. Operation digital chameleon: towards an open cybersecurity method
Scherb et al. A cyber attack simulation for teaching cybersecurity
Dawson et al. Applying software assurance and cybersecurity NICE job tasks through secure software engineering labs
Hamoud et al. Handling user-oriented cyber-attacks: STRIM, a user-based security training model
Hu et al. A dimensional perspective analysis on the cybersecurity risks and opportunities of chatgpt-like information systems
Park et al. Development of incident response tool for cyber security training based on virtualization and cloud
Natella et al. AI Code Generators for Security: Friend or Foe?
Scherb et al. A serious game for simulating cyberattacks to teach cybersecurity
Rani et al. Comprehensive analysis of various cyber attacks
Null Integrating security across the computer science curriculum
Chaskos Cyber-security training: a comparative analysis of cyberranges and emerging trends
Ernits et al. From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises
Standard et al. Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course
Malik et al. Mapping AICTE cybersecurity curriculum onto CyBOK: a case study
Savaglia et al. CYBERSECURITY VULNERABILITY ANALYSIS VIA VIRTUALIZATION.
Riihelä Teaching information security: A systematic mapping study
Grant Speeding up planning of cyber attacks using AI techniques: State of the art
Wilson Teaching security defense through web-based hacking at the undergraduate level
Puchkov et al. Criteria for Classification of Cyber-training and Analysis of Organizational and Technical Platforms for Their Conduct.