[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Vähäkainu et al., 2022 - Google Patents

Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures

Vähäkainu et al., 2022

View PDF
Document ID
1750884514399334004
Author
Vähäkainu P
Lehto M
Kariluoto A
Publication year
Publication venue
Cyber Security: Critical Infrastructure Protection

External Links

Snippet

Critical infrastructure (CI) is a vital asset for the economy and society's functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort in continuous operation, maintenance, performance …
Continue reading at jyx.jyu.fi (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Similar Documents

Publication Publication Date Title
Khraisat et al. A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
Amanullah et al. Deep learning and big data technologies for IoT security
Mishra et al. Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review
Srivastava et al. XAI for cybersecurity: state of the art, challenges, open issues and future directions
Xu Cybersecurity dynamics: A foundation for the science of cybersecurity
Al-Fawa'reh et al. Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior
Lee et al. A review on honeypot-based botnet detection models for smart factory
Al-Hawawreh et al. Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
Koroniotis et al. A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks
Sheikh et al. Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope
Mozaffari et al. Learning based anomaly detection in critical cyber-physical systems
El Kamel et al. A smart agent design for cyber security based on honeypot and machine learning
Zheng et al. Smart grid: Cyber attacks, critical defense approaches, and digital twin
Ávila et al. Use of security logs for data leak detection: a systematic literature review
Mogadem et al. A survey on internet of energy security: related fields, challenges, threats and emerging technologies
Kaushik et al. A novel intrusion detection system for internet of things devices and data
Vähäkainu et al. Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures
Salim et al. A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model
Thakral et al. Cybersecurity and ethics for IoT system: A massive analysis
Zibaeirad et al. A comprehensive survey on the security of smart grid: Challenges, mitigations, and future research opportunities
Peña A deep learning approach to detecting covert channels in the domain name system
Beulah et al. Detection of DDoS attack using ensemble machine learning techniques
Khan et al. TrustDroid: Enhancing Trust and Privacy for Android Mobile Phones by Preventing Riskware and SMS Malware
Eke et al. Framework for Detecting APTs Based on Steps Analysis and Correlation
Molcer et al. Machine learning based network intrusion detection system for internet of things cybersecurity