Improving Network, Data and Application Security for SMEs

被引:0
作者
Tselios, Christos [1 ]
Politis, Ilias [2 ]
Xenakis, Christos [2 ]
机构
[1] Univ Patras, Wireless Commun Lab, Achaia, Greece
[2] Univ Piraeus, Syst Secur Lab, Piraeus, Greece
来源
PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022 | 2022年
关键词
Security; Network; Data; SME;
D O I
10.1145/3538969.3544426
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of Information and Communications Technology and Cloud Computing, combined with the advent of novel telecommunication frameworks such as 5G, have introduced the notion of ubiquitous connectivity combined with a seemingly vast pool of resources, storage and services. This immense transformation introduced new types of security threats mostly due to the significant increase of the attack surface, which can now be compromised by malicious users. Despite the fact that malicious attacks constantly become more and more sophisticated, SMEs and public administrations remain reluctant to invest in cybersecurity since they operate on a limited budget and are mostly focused in time to market and cost minimization. The purpose of this book chapter is to provide an overview on how the most common network-related cybersecurity attacks are orchestrated, which are the systems and services they affect the most as well as present specific design principles and guidelines for crafting platforms and frameworks capable of mitigating such attacks and ensure a certain level of secure operation.
引用
收藏
页数:8
相关论文
共 26 条
[1]   Towards Secure Network Coding Enabled Mobile Small Cells [J].
Adat, Vipindev ;
Akhtar, Tafseer ;
Politis, Ilias ;
Tselios, Christos ;
Kotsopoulos, Stavros .
2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
[2]  
Dayal M, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P497, DOI 10.1109/CCAA.2016.7813770
[3]  
Joan D., 2002, The design of Rijndael
[4]  
Karabatak M., 2018, 6 INT S DIGITAL FORE, P1, DOI DOI 10.1109/ISDFS.2018.8355357
[5]  
Kavisankar L., 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT 2011), P251, DOI 10.1109/ICRTIT.2011.5972435
[6]  
Kumar S., 2007, Internet Monitoring and Protection, P25, DOI [10.1109/ICIMP.2007.42, DOI 10.1109/ICIMP.2007.42]
[7]  
Lalos A. S., 2019, SECURITY QUALITY CYB, P443
[8]   A Survey of Exploitation and Detection Methods of XSS Vulnerabilities [J].
Liu, Miao ;
Zhang, Boyu ;
Chen, Wenbin ;
Zhang, Xunlai .
IEEE ACCESS, 2019, 7 :182004-182016
[9]  
Mekuria Rufael., 2016, IEEE QOMEX 16 P IEEE
[10]   Rolling With Confidence: Managing the Complexity of DNSSEC Operations [J].
Muller, Moritz ;
Chung, Taejoong ;
Mislove, Alan ;
van Rijswijk-Deij, Roland .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03) :1199-1211