Securing Automation Systems Against Malware Intrusion

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dbshield: Securing Dropbox against Malware Dist Ribution

....................................................................................................................................................... 3 Introduction ................................................................................................................................................ 3 Dropbox the growth story .............................................................

متن کامل

Techniques for Securing Substation Automation Systems

Most critical infrastructure systems can be modeled as cyber-physical systems whose cyber components control the underlying physical components so as to optimize specified system objectives based on physical properties, physical constraints, and the current and estimated state of the system. Such systems usually require supports for security and performance guarantees: wrongly received or misse...

متن کامل

Securing Systems Against External Programs

executing external programs is widespread, the security implications have yet to be systematically analyzed. The authors address this problem here, offering a resource-centric classification of security issues and solutions. I nternet users routinely and often unknowingly download and run programs , such as Java applets; and some Web servers let users upload external programs and run them on th...

متن کامل

Securing WAN Environment against Intrusion using Behavior Based Mechanism

Intrusion Detection System (IDS) has been used as a vital instrument in defending the network from this malicious activity. With the ability to analyze network traffic and recognize incoming and ongoing network attack, majority of network administrator has turn to IDS to help them in detecting anomalies in network traffic. The gathering of information and analysis on the anomalies activity can ...

متن کامل

Optimation through Automation of Malware Update Process, Capable of Evading Anti-Malware Systems

Implementation and maintenance of malware protection measures imply high resources usage. Such is the case of Information Security Management Systems (ISMS), whose suggested structure is described by ISO Standard 27.001:2013. In this standard, work with malware is contemplated for penetration testing (pentesting) purposes, allowing to evaluate the response of computer systems against this kind ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security and Cryptography (Enigma)

سال: 2015

ISSN: 2595-5217

DOI: 10.17648/enig.v1i1.16