Securing Automation Systems Against Malware Intrusion
نویسندگان
چکیده
منابع مشابه
Dbshield: Securing Dropbox against Malware Dist Ribution
....................................................................................................................................................... 3 Introduction ................................................................................................................................................ 3 Dropbox the growth story .............................................................
متن کاملTechniques for Securing Substation Automation Systems
Most critical infrastructure systems can be modeled as cyber-physical systems whose cyber components control the underlying physical components so as to optimize specified system objectives based on physical properties, physical constraints, and the current and estimated state of the system. Such systems usually require supports for security and performance guarantees: wrongly received or misse...
متن کاملSecuring Systems Against External Programs
executing external programs is widespread, the security implications have yet to be systematically analyzed. The authors address this problem here, offering a resource-centric classification of security issues and solutions. I nternet users routinely and often unknowingly download and run programs , such as Java applets; and some Web servers let users upload external programs and run them on th...
متن کاملSecuring WAN Environment against Intrusion using Behavior Based Mechanism
Intrusion Detection System (IDS) has been used as a vital instrument in defending the network from this malicious activity. With the ability to analyze network traffic and recognize incoming and ongoing network attack, majority of network administrator has turn to IDS to help them in detecting anomalies in network traffic. The gathering of information and analysis on the anomalies activity can ...
متن کاملOptimation through Automation of Malware Update Process, Capable of Evading Anti-Malware Systems
Implementation and maintenance of malware protection measures imply high resources usage. Such is the case of Information Security Management Systems (ISMS), whose suggested structure is described by ISO Standard 27.001:2013. In this standard, work with malware is contemplated for penetration testing (pentesting) purposes, allowing to evaluate the response of computer systems against this kind ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Security and Cryptography (Enigma)
سال: 2015
ISSN: 2595-5217
DOI: 10.17648/enig.v1i1.16