Predicting Exploitations of Information Systems Vulnerabilities Through Attackers’ Characteristics
نویسندگان
چکیده
منابع مشابه
Information Systems Threats and Vulnerabilities
Vulnerability of Information Systems is a major concern these days in all spheres of Financial, government, private sectors. Security of the Information Systems is one of the biggest challenges faces by almost all the organizations in today's world. Even though most of the organizations have realized the value of information and the part it plays in the success of the business, yet only a ...
متن کاملMeasuring, analyzing and predicting security vulnerabilities in software systems
In this work we examine the feasibility of quantitatively characterizing some aspects of security. In particular, we investigate if it is possible to predict the number of vulnerabilities that can potentially be present in a software system but may not have been found yet. We use several major operating systems as representatives of complex software systems. The data on vulnerabilities discover...
متن کاملQuantifying Information Leak Vulnerabilities
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to measuring leakage of confidential information could be applied to substantial, real-world programs. This is mostly due to the high complexity of computing precise leakage quantities. In this paper, we introduce a techn...
متن کاملVulnerabilities of E-voting Systems
Practically, e-voting should comply with the social acceptance, technology and law. Many believe that e-voting is better than manual voting, as the former has less manual involvement. It is also believed that it is more secure and transparent. However, some security attacks may be launched which result in breaking both voting and e-voting requirements. In this paper, we discuss some aspects of ...
متن کاملStrategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary’s background knowledge when reasoning about the protection afforded by various anonymization schemes. Most existing work models the background knowledge of one individual adversary or privacy attacker, or makes a worstcase assumption that attackers will act as one: colluding through sharing ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2017
ISSN: 2169-3536
DOI: 10.1109/access.2017.2769063