Some Fundamental Cybersecurity Concepts

被引:17
|
作者
Wilson, Kelce S. [1 ]
Kiy, Muge Ayse [2 ]
机构
[1] BlackBerry, Patent Litigat, Irving, TX 75094 USA
[2] BlackBerry, Washington, DC 20001 USA
来源
IEEE ACCESS | 2014年 / 2卷
关键词
Computer hacking; computer security; reverse engineering; software protection;
D O I
10.1109/ACCESS.2014.2305658
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios. The concepts, which explain why trust in those systems was misplaced, provides a framework for both analyzing known exploits and also evaluating proposed protection systems for predicting likely potential vulnerabilities. The concepts are: 1) differentiating security threats into distinct classes; 2) a five layer model of computing systems; 3) a payload versus protection paradigm; and 4) the nine Ds of cybersecurity, which present practical defensive tactics in an easily remembered scheme. An eavesdropping risk, inherent in many smartphones and notebook computers, is described to motivate improved practices and demonstrate real-world application of the concepts to predicting new vulnerabilities. Additionally, the use of the nine Ds is demonstrated as analysis tool that permits ranking of the expected effectiveness of some potential countermeasures.
引用
收藏
页码:116 / 124
页数:9
相关论文
共 50 条
  • [1] Cybersecurity: Exploring core concepts through six scenarios
    Sherman, Alan T.
    DeLatte, David
    Neary, Michael
    Oliva, Linda
    Phatak, Dhananjay
    Scheponik, Travis
    Herman, Geoffrey L.
    Thompson, Julia
    CRYPTOLOGIA, 2018, 42 (04) : 337 - 377
  • [2] Citizens' Cybersecurity Behavior Some Major Challenges
    Li, Ying
    Xin, Tong
    Siponen, Mikko
    IEEE SECURITY & PRIVACY, 2022, 20 (01) : 54 - 61
  • [3] A Cybersecurity Educated Community
    Ahmad, Norita
    Laplante, Phillip A.
    DeFranco, Joanna F.
    Kassab, Mohamad
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (03) : 1456 - 1463
  • [4] Cybersecurity: From Months to Milliseconds
    Fonash, Peter
    Schneck, Phyllis
    COMPUTER, 2015, 48 (01) : 42 - 50
  • [5] Physics-Informed Satellite Cybersecurity
    Calabrese, Matteo
    Falco, Gregory
    COMPUTER, 2024, 57 (05) : 106 - 109
  • [6] Demythifying Cybersecurity
    Talbot, Edward B.
    Frincke, Deborah
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2010, 8 (03) : 56 - 59
  • [7] Cybersecurity Education Insights From a Novel Cybersecurity Summer Workshop
    Crabb, James
    Izurieta, Clemente
    Van Wie, Bernard
    Adesope, Olusola
    Gebremedhin, Assefaw
    IEEE SECURITY & PRIVACY, 2024, 22 (06) : 89 - 98
  • [8] Machine Learning and Deep Learning Approaches for CyberSecurity: A Review
    Halbouni, Asmaa
    Gunawan, Teddy Surya
    Habaebi, Mohamed Hadi
    Halbouni, Murad
    Kartiwi, Mira
    Ahmad, Robiah
    IEEE ACCESS, 2022, 10 : 19572 - 19585
  • [9] Teaching Cybersecurity with DeterLab
    Mirkovic, Jelena
    Benzel, Terry
    IEEE SECURITY & PRIVACY, 2012, 10 (01) : 73 - 76
  • [10] Blockchain, Cryptocurrency, and Cybersecurity
    Andriole, Stephen J.
    IT PROFESSIONAL, 2020, 22 (01) : 13 - 16