Taxonomy for Computer Security Incidents

نویسندگان

  • Stefan Kiltz
  • Andreas Lang
  • Jana Dittmann
چکیده

The adaptation and extension is necessary to apply the CERT-taxonomy to malware in order to categorise the threat (e.g., Trojan horses, Viruses etc.) as a basis for countermeasures. For the adaptation of the taxonomy to include malware a new entry in the tools section is needed (malicious software). This entry will cover the Trojan horses mentioned earlier. The proposed extension of the CERT-taxonomy will include the attacker-model, the vulnerability and the objectives. Within the attacker-model a new entry should be added, the security scan. This type of penetration testing by security-experts is similar to the works done by ‘white hat’hackers. However, such penetration testing is done by contractors on request, within strict margins concerning ethics and the assessment of potential damages before such testing takes place. The objectives within the CERT-taxonomy need a supplement, the security evaluation. This of course is the addition necessary to complement the introduction of the security scan. A very important vulnerability, social engineering, should be added to the taxonomy as well. It describes a very effective way to attack an IT-System. Two types can be distinguished, social engineering with the use of computers (e.g. e-mail content, phishing) and social engineering using human-based methods (e.g. dumpster diving, impostors).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of SCADA and Critical Infrastructure Incidents

In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can easily compare and contrast current and future SCADA incidents.

متن کامل

A Taxonomy of Computer and Network Attacks

A Taxonomy of Computer and Network Attacks This chapter presents a brief discussion of the desired characteristics of a taxonomy. This is followed by a critique of current taxonomies in the computer and network security field. These current taxonomies include lists of terms, lists of categories, results categories, empirical lists and matrices. A proposed taxonomy for computer and network attac...

متن کامل

A Comprehensive and Open Framework for Classifying Incidents Involving Cyber-Physical Systems

In recent years, events such as the Stuxnet nuclear plant cyber-attack have brought the security of industrial control systems under scrutiny. Most of this focus has been on supervisory control and data acquisition (SCADA) systems (more generically known as ICS or industrial control systems). While these systems play a major role in our daily lives, this focus tends to overlook the broader scop...

متن کامل

Towards a Taxonomy of Intrusion Detection Systems and Attacks

In recent years, an increasing number of intrusion-detection systems (IDSes) have become available [Sobire98]. This development has been driven, among other things, by the growing number of computer security incidents [CIN0799, Gross97, Howard97, Kumar95, LSMTTF98, Neuman98b, NeuPar89] which have highlighted the need for organizations to protect their networks against adversaries [Sundar96]. Th...

متن کامل

A Public Health Modeling Based Approach to Information Security Quantification

Title of dissertation: A PUBLIC HEALTH MODELING BASED APPROACH TO INFORMATION SECURITY QUANTIFICATION Edward M. Condon, Doctor of Philosophy, 2015 Dissertation directed by: Professor Michel Cukier Reliability Engineering Program Modeling the occurrence of computer security incidents within a defined population of computers can be used to help understand some of factors contributing to risk and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017