Vähäkainu et al., 2022 - Google Patents
Cyberattacks Against Critical Infrastructure Facilities and Corresponding CountermeasuresVähäkainu et al., 2022
View PDF- Document ID
- 1750884514399334004
- Author
- Vähäkainu P
- Lehto M
- Kariluoto A
- Publication year
- Publication venue
- Cyber Security: Critical Infrastructure Protection
External Links
Snippet
Critical infrastructure (CI) is a vital asset for the economy and society's functioning, covering sectors such as energy, finance, healthcare, transport, and water supply. Governments around the world invest a lot of effort in continuous operation, maintenance, performance …
- 230000000875 corresponding 0 title description 5
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khraisat et al. | A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges | |
Amanullah et al. | Deep learning and big data technologies for IoT security | |
Mishra et al. | Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review | |
Srivastava et al. | XAI for cybersecurity: state of the art, challenges, open issues and future directions | |
Xu | Cybersecurity dynamics: A foundation for the science of cybersecurity | |
Al-Fawa'reh et al. | Cyber threat intelligence using PCA-DNN model to detect abnormal network behavior | |
Lee et al. | A review on honeypot-based botnet detection models for smart factory | |
Al-Hawawreh et al. | Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms | |
Koroniotis et al. | A new Intelligent Satellite Deep Learning Network Forensic framework for smart satellite networks | |
Sheikh et al. | Intelligent and secure framework for critical infrastructure (CPS): Current trends, challenges, and future scope | |
Mozaffari et al. | Learning based anomaly detection in critical cyber-physical systems | |
El Kamel et al. | A smart agent design for cyber security based on honeypot and machine learning | |
Zheng et al. | Smart grid: Cyber attacks, critical defense approaches, and digital twin | |
Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
Mogadem et al. | A survey on internet of energy security: related fields, challenges, threats and emerging technologies | |
Kaushik et al. | A novel intrusion detection system for internet of things devices and data | |
Vähäkainu et al. | Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures | |
Salim et al. | A systematic literature review for APT detection and Effective Cyber Situational Awareness (ECSA) conceptual model | |
Thakral et al. | Cybersecurity and ethics for IoT system: A massive analysis | |
Zibaeirad et al. | A comprehensive survey on the security of smart grid: Challenges, mitigations, and future research opportunities | |
Peña | A deep learning approach to detecting covert channels in the domain name system | |
Beulah et al. | Detection of DDoS attack using ensemble machine learning techniques | |
Khan et al. | TrustDroid: Enhancing Trust and Privacy for Android Mobile Phones by Preventing Riskware and SMS Malware | |
Eke et al. | Framework for Detecting APTs Based on Steps Analysis and Correlation | |
Molcer et al. | Machine learning based network intrusion detection system for internet of things cybersecurity |