APPLIED CRYPTOGRAPHY AND PRACTICAL SCENARIOS FOR CYBER SECURITY DEFENSE

被引:0
|
作者
Simion, Emil [1 ]
Patrascu, Alecsandru [2 ]
机构
[1] Adv Technol Inst, Bucharest, Romania
[2] Univ Politehn Bucuresti, Dept Comp Sci, Eng, Bucharest, Romania
关键词
cryptography; cyber security; Cyber MITRE; malware; Flame; wireless hacking; WordPress hacking;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet is a rather new technology for us, but nevertheless it has become a force which is working its way into all our lives and there is no doubt in this. However it is important to realize the security issues that involve the Internet. Cyber security has emerged within the latest years as an issue of vital national and international importance, since governments, businesses and individuals are under constant attack from other governments, cyber criminals and hackers. These attacks consists in stealing large amount of money or personal and business data and compromise sensitive government operations. This paper explains these threats with accent on new forms of it. For in-depth understanding of the concept involved in cyber security, some attack scenarios explained in detail have been included.
引用
收藏
页码:131 / 142
页数:12
相关论文
共 50 条
  • [41] Cyber Security Applied to P&C IEDs
    Sarralde, Javier Lopez
    Miguel Yarza, Jose
    [J]. 2014 IEEE PES T&D CONFERENCE AND EXPOSITION, 2014,
  • [42] Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms
    Wan, Ming
    Li, Jiawei
    Liu, Ying
    Zhao, Jianming
    Wang, Jiushuang
    [J]. CHINA COMMUNICATIONS, 2021, 18 (01) : 130 - 150
  • [43] MODELING AND SIMULATION OF COOPERATION AND LEARNING IN CYBER SECURITY DEFENSE TEAMS
    Legato, Pasquale
    Mazza, Rina Mary
    [J]. PROCEEDINGS - 31ST EUROPEAN CONFERENCE ON MODELLING AND SIMULATION ECMS 2017, 2017, : 502 - 509
  • [44] Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
    Spafford, Eugene H.
    [J]. PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 20 - 33
  • [45] Modeling of Intrusion and Defense for Assessment of Cyber Security at Power Substations
    Chen, Ying
    Hong, Junho
    Liu, Chen-Ching
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 2541 - 2552
  • [46] CYBER SENTINEL: A TRIADIC DEFENSE PROTOCOL FOR SEAMLESS TRANSACTION SECURITY
    Muthusundari, S.
    Adityas
    Dhilip, S.
    Harish, R. K.
    [J]. 2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 147 - 152
  • [47] Context information based cyber security defense of protection system
    Su, Sheng
    Duan, Xianzhong
    Zeng, Xiangjun
    Chan, W. L.
    Li, K. K.
    [J]. 2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 294 - 294
  • [48] Integrated Security Threats and Defense of Cyber-physical Systems
    Liu T.
    Tian J.
    Wang J.-Z.
    Wu H.-Y.
    Sun L.-M.
    Zhou Y.-D.
    Shen C.
    Guan X.-H.
    [J]. Zidonghua Xuebao/Acta Automatica Sinica, 2019, 45 (01): : 5 - 24
  • [49] Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms
    Ming Wan
    Jiawei Li
    Ying Liu
    Jianming Zhao
    Jiushuang Wang
    [J]. China Communications, 2021, 18 (01) : 130 - 150
  • [50] A cyber-security framework for development, defense and innovation at NATO
    Efthymiopoulos M.P.
    [J]. Journal of Innovation and Entrepreneurship, 8 (1)