Some Fundamental Cybersecurity Concepts

被引:17
作者
Wilson, Kelce S. [1 ]
Kiy, Muge Ayse [2 ]
机构
[1] BlackBerry, Patent Litigat, Irving, TX 75094 USA
[2] BlackBerry, Washington, DC 20001 USA
来源
IEEE ACCESS | 2014年 / 2卷
关键词
Computer hacking; computer security; reverse engineering; software protection;
D O I
10.1109/ACCESS.2014.2305658
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios. The concepts, which explain why trust in those systems was misplaced, provides a framework for both analyzing known exploits and also evaluating proposed protection systems for predicting likely potential vulnerabilities. The concepts are: 1) differentiating security threats into distinct classes; 2) a five layer model of computing systems; 3) a payload versus protection paradigm; and 4) the nine Ds of cybersecurity, which present practical defensive tactics in an easily remembered scheme. An eavesdropping risk, inherent in many smartphones and notebook computers, is described to motivate improved practices and demonstrate real-world application of the concepts to predicting new vulnerabilities. Additionally, the use of the nine Ds is demonstrated as analysis tool that permits ranking of the expected effectiveness of some potential countermeasures.
引用
收藏
页码:116 / 124
页数:9
相关论文
共 50 条
  • [41] Cybersecurity Digital Labels for Connected and Autonomous Vehicles
    Khan, Wazir Zada
    Khan, Muhammad Khurram
    Arshad, Qurat-ul-Ain
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2023, 12 (01) : 87 - 93
  • [42] Framework, Tools and Good Practices for Cybersecurity Curricula
    Hajny, Jan
    Ricci, Sara
    Piesarskas, Edmundas
    Levillain, Olivier
    Galletta, Letterio
    De Nicola, Rocco
    [J]. IEEE ACCESS, 2021, 9 : 94723 - 94747
  • [43] NICE: Creating a Cybersecurity Workforce and Aware Public
    Paulsen, Celia
    McDuffie, Ernest
    Newhouse, William
    Toth, Patricia
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (03) : 76 - 79
  • [44] Does Insurance Have a Future in Governing Cybersecurity?
    Woods, Daniel W.
    Moore, Tyler
    [J]. IEEE SECURITY & PRIVACY, 2020, 18 (01) : 21 - 27
  • [45] Smart Environment for Adaptive Learning of Cybersecurity Skills
    Vykopal, Jan
    Seda, Pavel
    Svabensky, Valdemar
    Celeda, Pavel
    [J]. IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES, 2023, 16 (03): : 443 - 456
  • [46] How to Measure Cybersecurity and Why Heuristics Matter
    Oppliger, Rolf
    Grunert, Andreas
    [J]. COMPUTER, 2024, 57 (02) : 111 - 115
  • [48] Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity
    Chen, Huashan
    Cam, Hasan
    Xu, Shouhuai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3804 - 3821
  • [49] A Review of Cybersecurity Challenges in Smart Power Transformers
    Rahimpour, Hossein
    Tusek, Joe
    Musleh, Ahmed S.
    Liu, Boyu
    Abuadbba, Alsharif
    Phung, Toan
    Seneviratne, Aruna
    [J]. IEEE ACCESS, 2024, 12 : 193972 - 193996
  • [50] Efficient and Standardized Alarm Rationalization for Cybersecurity Monitoring
    Alabdulhadi, Sarah
    Al-Matouq, Ali
    [J]. IEEE ACCESS, 2024, 12 : 166936 - 166944