[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Jones et al., 2012 - Google Patents

A system‐aware cyber security architecture

Jones et al., 2012

View PDF
Document ID
17040236885078543951
Author
Jones R
Horowitz B
Publication year
Publication venue
Systems Engineering

External Links

Snippet

As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the capabilities to embed infections in equipment that is employed in nuclear power systems. In this paper, a new systems engineering focused approach for mitigating such risks is …
Continue reading at sercproddata.s3.us-east-2.amazonaws.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring

Similar Documents

Publication Publication Date Title
Jones et al. A system‐aware cyber security architecture
Nicholson et al. SCADA security in the light of Cyber-Warfare
Giraldo et al. Security and privacy in cyber-physical systems: A survey of surveys
McLaughlin et al. The cybersecurity landscape in industrial control systems
EP2916511B1 (en) High assurance security gateway interconnecting different domains
Saydjari Cyber defense: art to science
Horowitz et al. The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems
Ayala Cybersecurity lexicon
Ashley et al. Gamification of cybersecurity for workforce development in critical infrastructure
Fovino et al. Cyber security assessment of a power plant
Assenza et al. Cyber threats for operational technologies
Ani et al. Securing industrial control system environments: the missing piece
Jansen Developing and operating industrial security services to mitigate risks of digitalization
Karabacak et al. Zero Trust and Advanced Persistent Threats: Who Will Win the War?
Zahid et al. A security risk mitigation framework for cyber physical systems
Jackson Principles for resilient design-a guide for understanding and implementation
Fischer et al. IT security for functional resilience in energy systems: effect-centric IT security
Jones et al. System-aware security for nuclear power systems
Pieters et al. Cyber security as social experiment
Marinova et al. Hardware Solution for Cybersecurity of Unmanned Systems Critical Infrastructure
Horowitz Security Engineering
CAIRE Human factors in cybersecurity for transportation systems
Jones System-Aware Cyber Security
Balakrishnan et al. Strategies for Improving Cyber Resilience of Data-Intensive Business Information Systems
Stamp et al. Cyber Security Gap Analysis for Critical Energy Systems (CSGACES).