System Attack Modeling Techniques Critical Information Infrastructure

12/18/2021
by   A. K. Novokhrestov, et al.
0

Every day around the world, various organizations are exposed to more than a hundred attacks, most of which are success-fully repelled by information security specialists. However, attacks are also carried out that some information systems or specialists are unable to repel, which is why a large number of enterprises, as well as individuals, suffer huge monetary and reputational losses. The aim of the work is to train specialists through cyber polygons and interactive games to a high level of knowledge and skills in the field of information security

READ FULL TEXT
research
09/12/2020

A Review on Cyber Crimes on the Internet of Things

Internet of Things (IoT) devices are rapidly becoming universal. The suc...
research
07/31/2023

Introducing and Interfacing with Cybersecurity – A Cards Approach

Cybersecurity is an important topic which is often viewed as one that is...
research
02/01/2022

Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)

The increasing critical dependencies on Internetof-Things (IoT) have rai...
research
10/12/2018

ProPatrol: Attack Investigation via Extracted High-Level Tasks

Kernel audit logs are an invaluable source of information in the forensi...
research
01/18/2022

Analyzing Enterprise DNS Traffic to Classify Assets and Track Cyber-Health

The Domain Name System (DNS) is a critical service that enables domain n...
research
10/17/2017

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

Phishing is an especially challenging cyber security threat as it does n...
research
12/06/2018

On Critical Infrastructures, Their Security and Resilience - Trends and Vision

This short paper is presented in observance and promotion of November, t...

Please sign up or login with your details

Forgot password? Click here to reset