APPLIED CRYPTOGRAPHY AND PRACTICAL SCENARIOS FOR CYBER SECURITY DEFENSE

被引:0
|
作者
Simion, Emil [1 ]
Patrascu, Alecsandru [2 ]
机构
[1] Adv Technol Inst, Bucharest, Romania
[2] Univ Politehn Bucuresti, Dept Comp Sci, Eng, Bucharest, Romania
关键词
cryptography; cyber security; Cyber MITRE; malware; Flame; wireless hacking; WordPress hacking;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet is a rather new technology for us, but nevertheless it has become a force which is working its way into all our lives and there is no doubt in this. However it is important to realize the security issues that involve the Internet. Cyber security has emerged within the latest years as an issue of vital national and international importance, since governments, businesses and individuals are under constant attack from other governments, cyber criminals and hackers. These attacks consists in stealing large amount of money or personal and business data and compromise sensitive government operations. This paper explains these threats with accent on new forms of it. For in-depth understanding of the concept involved in cyber security, some attack scenarios explained in detail have been included.
引用
收藏
页码:131 / 142
页数:12
相关论文
共 50 条
  • [2] Serious games as a tool to model attack and defense scenarios for cyber-security exercises
    Yamin, Muhammad Mudassar
    Katt, Basel
    Nowostawski, Mariusz
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [3] Cyber Security for Smart Grid, Cryptography, and Privacy
    Iyer, Swapna
    [J]. INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2011, 2011
  • [4] Security aspects of practical quantum cryptography
    Brassard, G
    Lütkenhaus, N
    Mor, T
    Sanders, BC
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 289 - 299
  • [5] Hardware Security Kernel for Cyber Defense
    Jungwirth, Patrick
    Ross, James
    Secrest, Barry
    Barnett, Thomas
    Chan, Philip
    [J]. DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES II, 2019, 11013
  • [6] Modeling and executing cyber security exercise scenarios in cyber ranges
    Yamin, Muhammad Mudassar
    Katt, Basel
    [J]. COMPUTERS & SECURITY, 2022, 116
  • [7] Cyber Defense Through Hardware Security
    Jungwirth, Patrick
    Chan, Philip
    Barnett, Thomas, Jr.
    Badawy, Abdel-Hameed
    [J]. DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES, 2018, 10652
  • [8] Cyber Security - Threat Scenarios, Policy Framework and Cyber Wargames
    Vaseashta, Ashok
    Susmann, Philip
    Braman, Eric
    [J]. CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 1 - 10
  • [9] Automotive Connectivity, Cyber Attack Scenarios and Automotive Cyber Security
    Haas, Roland E.
    Moeller, Dietmar P. F.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2017, : 635 - 639
  • [10] A Cyber Security Discovery Program: Hands-on Cryptography
    Konak, Abdullah
    [J]. 2014 IEEE INTEGRATED STEM EDUCATION CONFERENCE (ISEC), 2014,