Applying zero trust security principles to defence mechanisms against data exfiltration attacks
| المؤلف | Egerton, Hugo | 
| المؤلف | Hammoudeh, Mohammad | 
| المؤلف | Unal, Devrim | 
| المؤلف | Adebisi, Bamidele | 
| تاريخ الإتاحة | 2023-12-05T10:28:39Z | 
| تاريخ النشر | 2021 | 
| اسم المنشور | Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications | 
| المصدر | Scopus | 
| الملخص | The zero-trust principle explicitly verifies that the authentication and authorization of all actions are performed regardless of the requesting user's credentials or permissions. This chapter presents the details of a mechanism that is capable of mitigating physical data exfiltration attacks, with a focus on physical vulnerabilities that can be exploited by insiders to acquire unauthorized access to sensitive information. First, it provides a critical review of recent prominent related literature around data exfiltration and the technologies utilized to perform it with a review of the current academic research. The chapter then proposes a defense mechanism that can protect systems against physical methods of data exfiltration attacks. Next, it critically analyzes the proposed defense mechanism and determines its viability as a solution that could be used for real-world scenarios of protecting against data exfiltration attacks. | 
| اللغة | en | 
| الناشر | wiley | 
| الموضوع | Data exfiltration attacks Defence mechanisms Physical data exfiltration mitigation Zero trust security principles  | 
| النوع | Book chapter | 
| الصفحات | 57-89 | 
الملفات في هذه التسجيلة
| الملفات | الحجم | الصيغة | العرض | 
|---|---|---|---|
| 
 لا توجد ملفات لها صلة بهذه التسجيلة.  | 
|||
هذه التسجيلة تظهر في المجموعات التالية
- 
الذكاء المعلوماتي [100 items ]
 

