Some Fundamental Cybersecurity Concepts

被引:17
作者
Wilson, Kelce S. [1 ]
Kiy, Muge Ayse [2 ]
机构
[1] BlackBerry, Patent Litigat, Irving, TX 75094 USA
[2] BlackBerry, Washington, DC 20001 USA
来源
IEEE ACCESS | 2014年 / 2卷
关键词
Computer hacking; computer security; reverse engineering; software protection;
D O I
10.1109/ACCESS.2014.2305658
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios. The concepts, which explain why trust in those systems was misplaced, provides a framework for both analyzing known exploits and also evaluating proposed protection systems for predicting likely potential vulnerabilities. The concepts are: 1) differentiating security threats into distinct classes; 2) a five layer model of computing systems; 3) a payload versus protection paradigm; and 4) the nine Ds of cybersecurity, which present practical defensive tactics in an easily remembered scheme. An eavesdropping risk, inherent in many smartphones and notebook computers, is described to motivate improved practices and demonstrate real-world application of the concepts to predicting new vulnerabilities. Additionally, the use of the nine Ds is demonstrated as analysis tool that permits ranking of the expected effectiveness of some potential countermeasures.
引用
收藏
页码:116 / 124
页数:9
相关论文
共 50 条
  • [31] SOTER: A Playbook for Cybersecurity Incident Management
    Onwubiko, Cyril
    Ouazzane, Karim
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (06) : 3771 - 3791
  • [32] Understanding Cybersecurity Education Gaps in Europe
    Ricci, Sara
    Parker, Simon
    Jerabek, Jan
    Danidou, Yianna
    Chatzopoulou, Argyro
    Badonnel, Remi
    Lendak, Imre
    Janout, Vladimir
    IEEE TRANSACTIONS ON EDUCATION, 2024, 67 (02) : 190 - 201
  • [33] Explainable Artificial Intelligence in CyberSecurity: A Survey
    Capuano, Nicola
    Fenza, Giuseppe
    Loia, Vincenzo
    Stanzione, Claudio
    IEEE ACCESS, 2022, 10 : 93575 - 93600
  • [34] Cybersecurity of Unmanned Aerial Vehicles: A Survey
    Yu, Zhenhua
    Wang, Zhuolin
    Yu, Jiahao
    Liu, Dahai
    Song, Houbing Herbert
    Li, Zhiwu
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2024, 39 (09) : 182 - 215
  • [35] On Aggregation and Prediction of Cybersecurity Incident Reports
    Carriegos, Miguel, V
    Munoz Castaneda, Angel L.
    Trobajo, M. T.
    Asterio De Zaballa, Diego
    IEEE ACCESS, 2021, 9 : 102636 - 102648
  • [36] A Survey on Explainable Artificial Intelligence for Cybersecurity
    Rjoub, Gaith
    Bentahar, Jamal
    Wahab, Omar Abdel
    Mizouni, Rabeb
    Song, Alyssa
    Cohen, Robin
    Otrok, Hadi
    Mourad, Azzam
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (04): : 5115 - 5140
  • [37] Conscious Machines for Autonomous Agents and Cybersecurity
    Kadin, Alan M.
    2021 INTERNATIONAL CONFERENCE ON REBOOTING COMPUTING (ICRC 2021), 2021, : 99 - 102
  • [38] AI/ML and Cybersecurity in Power Electronics
    Ozpineci, Burak
    IEEE POWER ELECTRONICS MAGAZINE, 2022, 9 (04): : 38 - 41
  • [39] Cybersecurity educational games: a theoretical framework
    Hwang, Mark, I
    Helser, Susan
    INFORMATION AND COMPUTER SECURITY, 2022, 30 (02) : 225 - 242
  • [40] The Cybersecurity Landscape in Industrial Control Systems
    McLaughlin, Stephen
    Konstantinou, Charalambos
    Wang, Xueyang
    Davi, Lucas
    Sadeghi, Ahmad-Reza
    Maniatakos, Michail
    Karri, Ramesh
    PROCEEDINGS OF THE IEEE, 2016, 104 (05) : 1039 - 1057