Home Tree Overview of Taxonomy

User-view Taxonomy

This is a taxonomy that classifies knowledge important for different users. The description give hints to specific issues in the area mentioned, as well as pointers to the main taxonomy. It is important to note that there are many aspects not mentioned, the selection is subjective.
End User Focus
Super categories -> User-view Taxonomy
A typical end user operates with limited permissions in an environment with clear processes. Nevertheless to avoid infiltration, he needs to know about certain issues, such as authentication and certificates.
External Resources:
Browser/Internet
Super categories -> End User Focus -> User-view Taxonomy
Since the internet is huge and no authority has great control over it, there are many dangers for users that don't know the security basics.
External Resources:
Certificates
Super categories -> Browser/Internet -> End User Focus -> User-view Taxonomy
Digitally signed certificates provide trust for providing user credentials. However, it is quite common to come across certificate errors and usually users don't understand the meaning of these. Judging the validity of a certificate is an important skill.
External Resources:
  • Browser interfaces and extended validation SSL certificates: an empirical study
    Robert Biddle, P.C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen; Proceedings CCSW; 2009.
  • TitleBrowser Interfaces and Extended Validation SSL Certificates: An Empirical Study
    Author
    Year2009
    Keywordusability and security, SSL certificates, extended validation, web site identity, user study, browser user interfaces
    AbstractThere has been a loss of confidence in the security provided by SSL certificates and browser interfaces in the face of various attacks. As one response, basic SSL server certificates are being demoted to second-class status in conjunction with the introduction of Extended Validation (EV) SSL certificates. Unfortunately, EV SSL certificates may complicate the already difficult design challenge of effectively conveying certificate information to the average user. This study explores the interfaces related to SSL certificates in the most widely deployed browser (Internet Explorer 7), proposes an alternative set of interface dialogs, and compares their effectiveness through a user study involving 40 participants. The alternative interface was found to offer statistically significant improvements in confidence, ease of finding information, and ease of understanding. Such results from a modest re-design effort suggest considerable room for improvement in the user interfaces of browsers today. This work motivates further study of whether EV SSL certificates offer a robust foundation for improving Internet trust, or a further compromise to usable security for ordinary users.
  • Defective By Design? - Certificate Revocation Behavior In Modern Browsers
    Paul Kehrer; Trustwave SpiderLabs; Blogpost; 2011.
Internet Security Software
Super categories -> Browser/Internet -> End User Focus -> User-view Taxonomy
Anti-malware software and firewalls protect the user from intrusion and malware, however it's possible to submerge this protection by tricking the user into deactivating them or not updating them.
External Resources:
Emails and Attachments/Downloads
Super categories -> Browser/Internet -> End User Focus -> User-view Taxonomy
Pishing emails and malware in attachments is still a problem, therefore, it is important to be aware of the dangers in emails.
External Resources:
Filetypes
Super categories -> Emails and Attachments/Downloads -> Browser/Internet -> End User Focus -> User-view Taxonomy
An attachment may be named with a confusing name such as Picture.jpg.exe, which makes it first appear that it is an image but in fact it is an executable. Therefore it is important to know what a certain file ending means. Note, that even safe filetypes can have unsafe content, since the ending is just the name of the file and does not change the contents, but usually the ending determines the way in which the content is interpreted.
External Resources:
Clickjacking
Super categories -> Emails and Attachments/Downloads -> Browser/Internet -> End User Focus -> User-view Taxonomy
Links in emails may be carefully prepared to look like it is a link to a website, but in fact it opens a carefully altered version of the original page, that will send any user data entered to the original sender of the email.
External Resources:
Javascript
Super categories -> Browser/Internet -> End User Focus -> User-view Taxonomy
Javascript is programming code that is executed on the user code. It is typically executed in a safe environment nevertheless it has access to private browser data and there are techniques for injecting code into trustworthy websites, which then will be executed by each visitor of the site.
External Resources:
  • Resolving JavaScript Vulnerabilities in the Browser Runtime
    Ejike Ofuonye, James Miller; Proceedings ISSRE; 2008.
  • TitleResolving JavaScript Vulnerabilities in the Browser Runtime
    AuthorEjike Ofuonye, James Miller ECE Department University of Alberta ofuonye@ualberta.ca, jm@ece.ualberta.ca
    Year2008
    Keyword
    AbstractThe volume of web based malware on the Internet keeps rising despite huge investments on web security. JavaScript, the dominant scripting language for web applications, is the primary channel for most of these attacks. In this paper, we describe research into the design and implementation of new web client protection system based on code instrumentation techniques. This system combines traditional static analysis techniques with a dynamic HTML, CSS and JavaScript code runtime monitoring agent to offer an efficient, easily deployable, policy driven framework for improved user protection. Rewriting and runtime monitoring are based on providing safe equivalents of JavaScript code constructs known to contain insecurities and hence exploitable by malicious web applications. As a demonstration of the practical capabilities of our framework, we also include a case study attack and empirical analysis of some of its various aspects across 1000 home pages belonging to the most popular web sites on the Internet.
Corporate Network
Super categories -> End User Focus -> User-view Taxonomy
In corporate networks the security is typically much higher, because there is more sensitive information that must not be exposed to the outside world.
External Resources:
Credentials
Super categories -> Corporate Network -> End User Focus -> User-view Taxonomy
Keeping the account information secure is very important. For this purpose many companies use smart cards or have extensive password policies to avoid attacks on user authentication
External Resources:
  • “The Four Most-Used Passwords Are Love, Sex, Secret, and God”: Password Security and Training in Different User Groups
    Birgy Lorenz, Kaido Kikkas, Aare Klooster; Proceedings Human Aspects of Information Security, Privacy and Trust HAS; 2013.
  • Title“The Four Most-Used Passwords Are Love, Sex, Secret, and God”: Password Security and Training in Different User Groups
    AuthorBirgy Lorenz, Kaido Kikkas, and Aare Klooster
    Year2013
    Keywordpasswords, security awareness, training, privacy, user behavior.
    AbstractPicking good passwords is a cornerstone of computer security. Yet already since the early days (e.g. The Stockings Were Hung by the Chimney with Care from 1973; we have also borrowed our title from the 1995 movie Hackers), insecure passwords have been a major liability. Ordinary users want simple and fast solutions – they either choose a trivial (to remember and to guess) password, or pick a good one, write it down and stick the paper under the mouse pad, inside the pocket book or to the monitor. They are also prone to reflecting their personal preferences in their password choices, providing telling hints online and giving them out on just a simple social engineering attack. Kevin Mitnick has said that security is not a product that can be purchased off the shelf, but consists of policies, people, processes, and technology. This applies fully to password security as well. We studied several different groups (students, educators, ICT specialists etc – more than 300 people in total) and their password usage. The methods included password practices survey, password training sessions, discussions and also simulated social engineering attacks (the victims were informed immediately about their mistakes). We suggest that password training should be adjusted for different focus groups. For example, we found that schoolchildren tend to grasp new concepts faster – often, a simple explanation is enough to improve the password remarkably. Thus, we would stress the people and process aspects of the Mitnick formula mentioned above.At the same time, many officials and specialists tend to react to password training with dismissal and scorn (our study suggests that 'you cannot guess my password' is an alarmingly common mindset). Examples like 'admin', 'Password', '123456' etc have occurred even at qualified security professionals, more so at educators. Yet, as Estonia is increasingly relying on the E-School system, these passwords are becoming a prime target. Therefore, for most adult users we suggest putting the emphasis on policy and technology aspects (strict, software-enforced lower limits of acceptable password length, character variability checks, but also clearly written rulesets etc).
VPN
Super categories -> Corporate Network -> End User Focus -> User-view Taxonomy
A Virtual Private Network (VPN) is an end-to-end encrypted connection that makes it possible to work from home. Virtually the computer is inside the company network and accesses the internet from there. VPN is a powerful tool for remote access. The dangers are that users reveal the credentials to a vpn to an untrusted person, then this person has access to the internal company network without being detected.
External Resources:
Social Engineering
Super categories -> Corporate Network -> End User Focus -> User-view Taxonomy
Social Engineering concerns the practice of using talking or other social interaction to obtain information that is helpful to intrude or otherwise damage a network or virtual service.
External Resources:
Tailgating
Super categories -> Social Engineering -> Corporate Network -> End User Focus -> User-view Taxonomy
One kind of social engineering is sneaking into doors while they are closing. This allows getting physical access to otherwise restricted areas. This can be avoided by making sure that the door is properly closed when entering a building. A variation of this is "piggybacking", where someone walks behind a person and hopes the person will hold the door open for them.
External Resources:
  • Embedded based tailgating/piggybacking detection security system
    Tjun Wern Chan, Vooi Voon Yoop, Chit Siang Soh; Proceedings CHUSER; 2012.
  • TitleEmbedded Based Tailgating/Piggybacking Detection Security System
    AuthorTjun Wern Chan, Vooi Voon Yap and Chit Siang Soh Faculty of Engineering and Green Technology Universiti Tunku Abdul Rahman Kampar, Perak, Malaysia
    Year2012
    Keywordtailgating; piggybacking; security system; OpenCV; embedded; open source
    AbstractAccess control is a system which enables the authority to control and restrict access to a target sensitive or secured area. However, its effectiveness is highly dependent on the proper usage of the system by those who are granted access. These authorized personnel have total control of the door from the time it unlocks until it relocks again. One of the biggest weaknesses of automated access control is the lacked of a system to prevent a practice known as “tailgating” or “piggybacking”. This paper presents a low cost solution to this problem by using a single internet protocol camera and an embedded based control unit combining with video analytics technology. Results showed that the developed system is able to detect various tailgating/piggybacking violations successfully.
Shoulder Surfing
Super categories -> Social Engineering -> Corporate Network -> End User Focus -> User-view Taxonomy
Another common form of social engineering is shoulder surfing. It is the practice of standing behind someone while he types his password or has sensitive information on screen. This might especially be true in crowded or improvised offices.
External Resources:
  • A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
    Furkan Tari, A. Ant Ozok, Stephen H. Holden; Proceedings SOUPS; 2006.
  • TitleA Comparison of Perceived and Real Shoulder-surfing Risks between Alphanumeric and Graphical Passwords
    AuthorFurkan Tari A. Ant Ozok Stephen H. Holden
    Year2006
    KeywordAuthentication, Human Factors, Social Engineering, Shoulder Surfing, Graphical Passwords, Authentication, Password Security, Usable Security.
    AbstractPrevious research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns that this increase in memorability could also lead to an increased susceptibility of graphical passwords to shoulder-surfing. This appears to be yet another example of the classic trade-off between usability and security for authentication systems. This paper explores whether graphical passwords’ increased memorability necessarily leads to risks of shoulder-surfing. To date, there are no studies examining the vulnerability of graphical versus alphanumeric passwords to shoulder-surfing.
Wireless Networks
Super categories -> End User Focus -> User-view Taxonomy
In contrast to wired connections, the communication signal in a wireless network can be picked up by anyone who is standing close enough, therefore encryption is a must to be safe from attacks.
External Resources:
Public Wi-Fi
Super categories -> Wireless Networks -> End User Focus -> User-view Taxonomy
Public Wi-Fi access points are common and a convenient solution when traveling. The problem is that all the communication on a public Wi-Fi can typically be read by anyone else who has access to that Wi-Fi. And with man in the middle attacks based on spoofing it is easy to acquire sensitive information. Even establishing a VPN connection might be dangerous if the user authentication is not secure.
External Resources:
Private Wi-Fi
Super categories -> Wireless Networks -> End User Focus -> User-view Taxonomy
Private Wi-Fi connections are typically encrypted. Hence, the main concern for an attacker is getting authenticated. However, they might be encrypted with a weak standard (WEP), which allow brute force attacks. Once a hacker has access, the same methods as for Public Wi-Fi apply.
External Resources:
Mobile
Super categories -> End User Focus -> User-view Taxonomy
Mobile devices are connected to many different networks. This phenomenon is rather new and attacks start being developed that spread virally using mobile devices. It is important to be cautious with using mobile devices in insecure environments.
External Resources:
  • Mobile Malware Threats and Defenses for Homeland Security
    Seung-Hyun Seo, Kangbin Yim, Ilsun You; Proceedings CD-ARES; 2012.
  • TitleMobile Malware Threats and Defenses for Homeland Security
    AuthorKangbin Yim, and Ilsun You
    Year2012
    Keyword
    AbstractAs the population of mobile users grows rapidly, mobile malware targeting smartphones are becoming a new threat to homeland security. So far, many kinds of malicious malwares including monetizing, stealing credentials or rooting have emerged. The latest mobile malwares are especially posing a serious threat to homeland security, because they can zombify phones to be controlled by their command and conquer servers. In this paper, we survey the threats and malicious behaviors of current mobile malwares. Then, we study the defense mechanisms of mobile malware and introduce a cooperative system for mobile security in South Korea. We also discuss the possible future of mobile malware and attack techniques.
Antivirus
Super categories -> Mobile -> End User Focus -> User-view Taxonomy
There is antivirus and antimalware software for phones, however the techniques are not yet as mature as antivirus detection for computers. Therefore, it is important to be cautious and avoiding suspicious websites that could contain malware.
External Resources:
Spreading
Super categories -> Mobile -> End User Focus -> User-view Taxonomy
One big issue with mobile devices is the wealth in which they can connect to other devices: cell network, Wi-Fi, usb connection, bluetooth, NFC (near field communication). This makes spreading malware via mobile devices a particularly attractive option.
External Resources:
Human Resources Focus
Super categories -> User-view Taxonomy
Human resources people need additional permissions and knowledge about authentication and authorization, since they may be in charge of giving authorization and setting up user accounts.
External Resources:
Authorization
Super categories -> Human Resources Focus -> User-view Taxonomy
There need to be clear protocols on how to obtain authorization for certain privileged resources. In particular, it should be clear what roles a user might request on his own.
External Resources:
Least Privileges
Super categories -> Authorization -> Human Resources Focus -> User-view Taxonomy
This principle states that a user should never have more privileges than he needs based on his tasks.
External Resources:
Exceptional Permissions
Super categories -> Authorization -> Human Resources Focus -> User-view Taxonomy
There might be circumstances when users need expanded privileges for a certain time, for instance, when they replace someone temporarily. The most important step here is to revoke the privileges after the relevant time frame passed.
External Resources:
Secure Authentication
Super categories -> Human Resources Focus -> User-view Taxonomy
Secure authentication typically involves multi-factor authentication. Also the way in which the credentials are distributed needs to be secure.
External Resources:
Account Privacy
Super categories -> Secure Authentication -> Human Resources Focus -> User-view Taxonomy
The information about who has access to a certain privileged resource should be private to avoid social engineering attacks.
External Resources:
Multi-Factor Authentication
Super categories -> Secure Authentication -> Human Resources Focus -> User-view Taxonomy
Since authentication with multiple methods is more secure it is always better to rely on more than one authentication method of a different type, e.g. a knowledge-based and a biometric method.
External Resources:
Permanent Network Administrator Focus
Super categories -> User-view Taxonomy
Administrators and also security monitoring people (who might not be the same for security reasons) need a comprehensive knowledge of cyber attacks and defense mechanisms.
External Resources:
Encryption
Super categories -> Permanent Network Administrator Focus -> User-view Taxonomy
One important step is keeping the encryption methods current and changing the used encryption when there are feasible successful attacks.
External Resources:
  • An Overview of Cryptanalysis Research of the Advanced Encryption Standard
    Stanisław P. Radziszowski, Alan Kaminsky, Michael Kurdziel; Proceedings MILCOM; 2010.
  • TitleAn Overview of Cryptanalysis Research for the Advanced Encryption Standard
    AuthorAlan Kaminsky, Michael Kurdziel, Stanisław Radziszowski Rochester Institute of Technology, Rochester, NY
    Year2003
    KeywordAdvanced Encryption Standard; AES; Cryptanalysis; Side Channel Attacks
    AbstractSince its release in November 2001, the Advanced Encryption Standard (NIST FIPS-197) has been the subject of extensive cryptanalysis research. The importance of this research has intensified since AES was named, in 2003, by NSA as a Type-1 Suite B Encryption Algorithm (CNSSP-15). As such, AES is now authorized to protect classified and unclassified national security systems and information. This paper provides an overview of current cryptanalysis research on the AES cryptographic algorithm. Discussion is provided on the impact by each technique to the strength of the algorithm in national security applications. The paper is concluded with an attempt at a forecast of the usable life of AES in these applications.
Prevention
Super categories -> Permanent Network Administrator Focus -> User-view Taxonomy
An administrator needs to assure that all equipment with access to the network is properly protected with anti-virus and firewall software, as well as, appropriate security settings in the operating systems and sensitive applications.
External Resources:
Monitor
Super categories -> Permanent Network Administrator Focus -> User-view Taxonomy
The first step in securing a network is monitoring the traffic, both the incoming traffic, as well as, the internal traffic, for potential attacks.
External Resources:
Defense
Super categories -> Permanent Network Administrator Focus -> User-view Taxonomy
When a threat is recognized it needs to be appropriately handled, so that the impact is minimized. An administrator needs to know which ways help.
External Resources:
Quarantining
Super categories -> Defense -> Permanent Network Administrator Focus -> User-view Taxonomy
The first response is always cutting the infected device from the network and potentially analyzing it. It may also be necessary to quarantine additional potentially infected devices.
External Resources:
  • Internet Quarantine: Requirements for Containing Self-Propagating Code
    D. Moore, C. Shannon, G. Voelker, and S. Savage; Proceedings INFOCOM; 2003.
  • TitleRequirements for Containing Self-Propagating Code Internet Quarantine:
    AuthorDavid Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage University of California, San Diego
    Year2001
    Keyword
    AbstractIt has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have seen a dramatic increase in the frequency and virulence of such “worm” outbreaks. For example, the Code-Red worm epidemics of 2001 infected hundreds of thousands of Internet hosts in a very short period – incurring enormous operational expense to track down, contain, and repair each infected machine. In response to this threat, there is considerable effort focused on developing technical means for detecting and containing worm infections before they can cause such damage. This paper does not propose a particular technology to address this problem, but instead focuses on a more basic question: How well will any such approach contain a worm epidemic on the Internet? We describe the design space of worm containment systems using three key parameters – reaction time, containment strategy and deployment scenario. Using a combination of analytic modeling and simulation, we describe how each of these design factors impacts the dynamics of a worm epidemic and, conversely, the minimum engineering requirements necessary to contain the spread of a given worm. While our analysis cannot provide definitive guidance for engineering defenses against all future threats, we demonstrate the lower bounds that any such system must exceed to be useful today. Unfortunately, our results suggest that there are significant technological and administrative gaps to be bridged before an effective defense can be provided in today’s Internet. ability of the population, the length of the infectious period and the rate of infection. These translate into three potential interventions to mitigate the threat of worms: prevention, treatment, and containment. This paper focuses exclusively on the last approach, but we briefly discuss each to justify that decision.
Restore Network
Super categories -> Defense -> Permanent Network Administrator Focus -> User-view Taxonomy
In worst case a whole network or subnetwork needs to be shut down in order to be sure that the infection did not spread. After detecting and removing all infected computers, all the authentication credentials that may have been exposed need to be changed and other security-relevant information that could have been exposed needs to be made void as much as possible.
External Resources:
Temporary Collaboration Network Administrator Focus
Super categories -> User-view Taxonomy
When a network is set up in a setting with different parties from different organizations in a short time, additional complications are introduced. There may not be common data sharing and other network policies, which further makes this a difficult cybersecurity environment.
External Resources:
  • Communication challenges in emergency response
    B.S. Manoj, Alexandra Hubenko Baker; Communications of the ACM; no. 3 vol. 50; 2007.
  • Plugging the leaks without unplugging your network in the midst of Disaster
    Aaron D Goldman, Arif Selcuk Uluagacy, Raheem Beyahy, John A Copeland; Proceedings LCN; 2012.
  • Designing a Secure Local Area Network
    Daniel Oxenhandler; Sans Institute; White Paper; 2003.
  • TitlePlugging the Leaks Without Unplugging Your Network in the Midst of Disaster
    AuthorAaron D Goldman, Arif Selcuk Uluagac
    Year2012
    Keyword
    AbstractNetwork Disaster Recovery research has examined behavior of networks after disasters with an aim to restoring normal conditions. In addition to probable loss of connectivity, a disaster scenario can also lead to security risks. However, network security has been examined extensively under normal conditions, and not under conditions that ensue after disasters. Therefore, security issues should be addressed during the period of chaos after a disaster, but before operating conditions return to normal. Furthermore, security should be assured, while still allowing access to the network to enable public communication in order to assist in disaster relief efforts. In general, the desire to help with public assistance requires opening up access to the network, while security concerns add pressure to close down or limit access to the network. In this study, we show that the objectives of availability and confidentiality, two objectives that have not previously been considered together in disaster scenarios, can be simultaneously achieved. For our study, we evaluated six wireless devices with various network configurations, including a laptop, a Kindle Fire e-reader, an Android tablet, a Google Nexus phone, an IP camera, and an Apple TV, to approximate behaviors of a communication network under a disaster scenario. Actual data leakage was tracked and observed for these devices. To the best of our knowledge this has not previously been examined in a systematic manner for post-disaster scenarios. After illustrating the data leakage of various devices, we analyze the risk associated with the various types of leakage. Moving private traffic to a VPN would free the physical network for use as a public resource. Index Terms—Data Leakage, Network Disaster Recovery, Availability, Confidentiality, Post-Disaster Network Security
Shared Data Access
Super categories -> Temporary Collaboration Network Administrator Focus -> User-view Taxonomy
Since collaboration usually includes data sharing, a common server is usually set up. The difficult part is deciding and implementing what data can be shared with whom. For this an authorization model is necessary, as well as a quick way to develop a plan on who needs which data. Network credentials can then be given to users, but they need to handle the data with care (as well as their badge or other access to the location).
External Resources:
Shared Infrastructure
Super categories -> Temporary Collaboration Network Administrator Focus -> User-view Taxonomy
Then, furthermore since the building is shared and some of the hardware is shared, it's important to make sure that sensitive private data stays safe. To this separation is the key. Physical separation as much as possible to avoid shoulder-surfing and digital separation to separate different subnetworks effectively, so that each party can share data among them and be sure it's safe.
External Resources:
  • Design and Implementation of Secure Subnet Inside of Data Sensitive Network
    Haiwei Xue, Yunliang Zhang, Zhien Guo, Yiqi Dai; Journal of Software Engineering and Applications; no. 3B vol. 6; 2013.
  • TitleDesign and Implementation of Secure Subnet Inside of Data Sensitive Network
    AuthorHaiwei Xue, Yunliang Zhang, Zhien Guo, Yiqi Dai
    Year2013
    KeywordComponent; Privacy; Netwrok Security; Access Control; Inside Leak; Security Model; BLP
    AbstractSensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional mandatory access control (MAC) can only control whether the user can access the sensitive data or not, and cannot prevent the user to leak or spread the data. So even designed impeccable access control policies, we still cannot prevent inside leak. A nature solution is using physical isolation to prevent sensitive data from being leaked outside network; however inside the physical isolated network, data still can be spread from one subnet to another. We present Secure Subnet System, a BLP model base security system that can provide more strong access control, which is called mandatory action control. In our system after a user read sensitive data, system will dynamically change security policies to prevent the user to leak these data or spread the data outside to another subnet. We use a state machine model to describe our system, and use secure transfer equations to dynamically calculate the system policies for each new state. Our model can be proved to be secure by formal methods. We implemented a demon of our system. In this paper we also show the design details of the demon and evaluate the demon both from security and performance. The evaluation results show that the output of the security tests case are under expected; and the performance test case show that, for the 64KB IO chunk size, IO read loss can be improved to 6.6%, IO write loss can be improved to 1.2% after optimization.
Insecure Devices
Super categories -> Shared Infrastructure -> Temporary Collaboration Network Administrator Focus -> User-view Taxonomy
One problem with having different organizations join a network is that it is hard to check whether the devices that are connected already have malware. Preferably there should be a policy that requires anti-virus software, but still there could be an infection from earlier, therefore at least a quick malware scan should be required. Other security requirements may be necessary.
External Resources:
  • Malware defense using network security authentication
    Joseph V. Antrosin, Errin W. Fulp; Proceedings International Workshop on Information Assurance (IWIA); 2005.
  • TitleMalware Defense Using Network Security Authentication £
    AuthorJoseph V. Antrosio and Errin W. Fulp Wake Forest University Department of Computer Science Winston-Salem, NC, USA nsg.cs.wfu.edu antrjv|fulp @wfu.edu
    Year2005
    Keyword
    AbstractMalware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised, these systems are not designed to stop the spread or damage of malware. Standard gateway firewalls can prevent outside-based attacks; however, they are ineffective in a mobile network where threats originate from inside and administrators have limited control over client machines. This paper introduces a new strategy for malware defense using security authentication which focuses on vulnerabilities rather than exploits. The proposed system uses a remote security scanner to check for vulnerabilities and quarantines machines using logical network segmentation. This maximizes the usefulness of the machine in question while preventing attacks. Furthermore given the unique ability to quarantine machines without any specialized host software, the proposed system can defend against internal malware threats in a mobile network. been achieved utilizing a proof-of-concept model and standard networking tools.
External Access/DMZ
Super categories -> Shared Infrastructure -> Temporary Collaboration Network Administrator Focus -> User-view Taxonomy
One issue is with collaborators, which are not in the same location. It might be necessary for them to contribute data. However, allowing internet access can be dangerous and configuring a VPN takes time. One possible solution is using a separate server that is in a DMZ (Demilitarized zone), this means that only this server is accessible from the internet and the whole rest of the network is not.
External Resources:
Infection Response
Super categories -> Temporary Collaboration Network Administrator Focus -> User-view Taxonomy
What happens if Malware is found on a computer inside the network. This is directly connected to Defense.
External Resources:
  • A taxonomy of cyber attack and defence mechanisms for emergency management networks
    George Loukas, Diane Gan, Tuan Vuong; Proceedings PERCOM; 2013.
  • Title
    Author
    Year2013
    KeywordSurvey; Pervasive Computing; Network-level security and protection; Physical Security
    AbstractEmergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures. A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency. We propose a taxonomy of existing and potential research that is relevant in this setting, covering attack types that have already occurred or are likely to occur, and defence mechanisms that are already in use or would be applicable.