TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATION
نویسندگان
چکیده
منابع مشابه
Penetration Testing of OPC as Part of Process Control Systems
We have performed penetration testing on OPC, which is a central component in process control systems on oil installations. We have shown how a malicious user with different privileges – outside the network, access to the signalling path and physical access to the OPC server – can fairly easily compromise the integrity, availability and confidentiality of the system. Our tentative tests demonst...
متن کاملSecure Computer Systems: A Mathematical Model
This paper presents a set of rules of operation which guarantee that a computer system can remain secure while exhibiting certain desired external characteristics. The rules are easily transformable into algorithms suitable for implementation on a digital computer. iii PREFACE In our introductory paper on secure computer systems (MTR-2547, Vol. I) we introduced a framework for mathematical mode...
متن کاملMethodology for Penetration Testing
Penetration testing is one of the oldest methods for assessing the security of a computer system. The idea behind penetration testing methodologies is that the penetration tester should follow a pre-scripted format during test as dictated by the methodology. A penetration testing methodology was proposed in this research. It is also important to consider a policy that should be followed by both...
متن کاملAutomated Attack Planning using a Partially Observable Model for Penetration Testing of Industrial Control Systems
Context Industrial control systems govern important industrial processes as well as many other areas of daily life including building automation and the energy infrastructure. In the past, such systems were rarely networked if at all. Recently, however, a need for a higher degree of communication between different systems as well as other company resources has arisen. While leading to increased...
متن کاملPenetration Testing
The TCB shall be found resistant to penetration. Near flawless penetration testing is a requirement for high-rated secure systems — those rated above B1 based on the Trusted Computer System Evaluation Criteria (TCSEC) and its Trusted Network and Database Interpretations (TNI and TDI). Unlike security functional testing, which demonstrates correct behavior of the product's advertised security co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advanced Information Systems
سال: 2020
ISSN: 2522-9052
DOI: 10.20998/2522-9052.2020.3.19