Two threat patterns that exploit "security misconfiguration" and "sensitive data exposure" vulnerabilities.
Rohini SulatyckiEduardo B. FernándezPublished in: EuroPLoP (2015)
Keyphrases
- sensitive data
- information security
- countermeasures
- smart card
- security issues
- security concerns
- protection mechanisms
- security threats
- privacy preserving
- unauthorized access
- security requirements
- security vulnerabilities
- data confidentiality
- data privacy
- information systems
- personal data
- data storage
- network security
- sensitive information
- data sharing
- confidential data
- malicious users
- security patterns
- security mechanisms
- third party
- intrusion detection
- database
- privacy protection
- data mining techniques
- frequent patterns