Some Fundamental Cybersecurity Concepts

被引:17
|
作者
Wilson, Kelce S. [1 ]
Kiy, Muge Ayse [2 ]
机构
[1] BlackBerry, Patent Litigat, Irving, TX 75094 USA
[2] BlackBerry, Washington, DC 20001 USA
来源
IEEE ACCESS | 2014年 / 2卷
关键词
Computer hacking; computer security; reverse engineering; software protection;
D O I
10.1109/ACCESS.2014.2305658
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios. The concepts, which explain why trust in those systems was misplaced, provides a framework for both analyzing known exploits and also evaluating proposed protection systems for predicting likely potential vulnerabilities. The concepts are: 1) differentiating security threats into distinct classes; 2) a five layer model of computing systems; 3) a payload versus protection paradigm; and 4) the nine Ds of cybersecurity, which present practical defensive tactics in an easily remembered scheme. An eavesdropping risk, inherent in many smartphones and notebook computers, is described to motivate improved practices and demonstrate real-world application of the concepts to predicting new vulnerabilities. Additionally, the use of the nine Ds is demonstrated as analysis tool that permits ranking of the expected effectiveness of some potential countermeasures.
引用
收藏
页码:116 / 124
页数:9
相关论文
共 50 条
  • [21] Out to explore the cybersecurity planet
    Bella, Giampaolo
    JOURNAL OF INTELLECTUAL CAPITAL, 2020, 21 (02) : 291 - 307
  • [22] Prosumer Nanogrids: A Cybersecurity Assessment
    Dafalla, Yousif
    Liu, Bo
    Hahn, Dalton A.
    Wu, Hongyu
    Ahmadi, Reza
    Bardas, Alexandru G.
    IEEE ACCESS, 2020, 8 : 131150 - 131164
  • [23] Teaching Cybersecurity Using the Cloud
    Salah, Khaled
    Hammoud, Mohammad
    Zeadally, Sherali
    IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES, 2015, 8 (04): : 383 - 392
  • [24] Cybersecurity strategies: The QuERIES methodology
    Carin, Lawrence
    Cybenko, George
    Hughes, Jeff
    COMPUTER, 2008, 41 (08) : 20 - +
  • [25] Adversarial XAI Methods in Cybersecurity
    Kuppa, Aditya
    Nhien-An Le-Khac
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4924 - 4938
  • [26] Controlled Mode Distinguishability for Cybersecurity
    Sun, Dawei
    Hwang, Inseok
    Corless, Martin
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 998 - 1003
  • [27] Roadmap for Cybersecurity in Autonomous Vehicles
    Kukkala, Vipin Kumar
    Thiruloga, Sooryaa Vignesh
    Pasricha, Sudeep
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (06) : 13 - 22
  • [28] Harnessing the Cloud for Teaching Cybersecurity
    Salah, Khaled
    PROCEEDINGS OF THE 45TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION (SIGCSE'14), 2014, : 529 - 534
  • [29] Winning Cybersecurity One Challenge at a Time
    Gavas, Efstratios
    Memon, Nasir
    Britton, Douglas
    IEEE SECURITY & PRIVACY, 2012, 10 (04) : 75 - 79
  • [30] Cybersecurity Road Map for Digital Manufacturing
    Tsoutsos, Nektarios Georgios
    Gupta, Nikhil
    Karri, Ramesh
    COMPUTER, 2020, 53 (09) : 80 - 84