Taxonomy for Computer Security Incidents
نویسندگان
چکیده
The adaptation and extension is necessary to apply the CERT-taxonomy to malware in order to categorise the threat (e.g., Trojan horses, Viruses etc.) as a basis for countermeasures. For the adaptation of the taxonomy to include malware a new entry in the tools section is needed (malicious software). This entry will cover the Trojan horses mentioned earlier. The proposed extension of the CERT-taxonomy will include the attacker-model, the vulnerability and the objectives. Within the attacker-model a new entry should be added, the security scan. This type of penetration testing by security-experts is similar to the works done by ‘white hat’hackers. However, such penetration testing is done by contractors on request, within strict margins concerning ethics and the assessment of potential damages before such testing takes place. The objectives within the CERT-taxonomy need a supplement, the security evaluation. This of course is the addition necessary to complement the introduction of the security scan. A very important vulnerability, social engineering, should be added to the taxonomy as well. It describes a very effective way to attack an IT-System. Two types can be distinguished, social engineering with the use of computers (e.g. e-mail content, phishing) and social engineering using human-based methods (e.g. dumpster diving, impostors).
منابع مشابه
A Survey of SCADA and Critical Infrastructure Incidents
In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can easily compare and contrast current and future SCADA incidents.
متن کاملA Taxonomy of Computer and Network Attacks
A Taxonomy of Computer and Network Attacks This chapter presents a brief discussion of the desired characteristics of a taxonomy. This is followed by a critique of current taxonomies in the computer and network security field. These current taxonomies include lists of terms, lists of categories, results categories, empirical lists and matrices. A proposed taxonomy for computer and network attac...
متن کاملA Comprehensive and Open Framework for Classifying Incidents Involving Cyber-Physical Systems
In recent years, events such as the Stuxnet nuclear plant cyber-attack have brought the security of industrial control systems under scrutiny. Most of this focus has been on supervisory control and data acquisition (SCADA) systems (more generically known as ICS or industrial control systems). While these systems play a major role in our daily lives, this focus tends to overlook the broader scop...
متن کاملTowards a Taxonomy of Intrusion Detection Systems and Attacks
In recent years, an increasing number of intrusion-detection systems (IDSes) have become available [Sobire98]. This development has been driven, among other things, by the growing number of computer security incidents [CIN0799, Gross97, Howard97, Kumar95, LSMTTF98, Neuman98b, NeuPar89] which have highlighted the need for organizations to protect their networks against adversaries [Sundar96]. Th...
متن کاملA Public Health Modeling Based Approach to Information Security Quantification
Title of dissertation: A PUBLIC HEALTH MODELING BASED APPROACH TO INFORMATION SECURITY QUANTIFICATION Edward M. Condon, Doctor of Philosophy, 2015 Dissertation directed by: Professor Michel Cukier Reliability Engineering Program Modeling the occurrence of computer security incidents within a defined population of computers can be used to help understand some of factors contributing to risk and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017