Modem network vulnerabilities and security testing - Actual threats.
Michal PolivkaVáclav OujezskýVladislav SkorpilPublished in: TSP (2015)
Keyphrases
- buffer overflow
- information security
- security threats
- security issues
- security vulnerabilities
- security measures
- security risks
- countermeasures
- cyber attacks
- security breaches
- security mechanisms
- denial of service attacks
- network administrators
- intrusion detection
- security problems
- enterprise network
- network security
- dos attacks
- attack scenarios
- computer security
- cyber security
- denial of service
- critical infrastructure
- data corruption
- network architecture
- information systems
- network management
- fault injection
- smart grid
- access control
- security services
- network traffic
- intrusion detection system
- national security
- security requirements
- security management
- insider attacks
- virtual private network
- worm detection
- sql injection
- attack graphs
- security patterns
- sensitive data
- network structure
- cloud computing
- peer to peer