Applying zero trust security principles to defence mechanisms against data exfiltration attacks
Author | Egerton, Hugo |
Author | Hammoudeh, Mohammad |
Author | Unal, Devrim |
Author | Adebisi, Bamidele |
Available date | 2023-12-05T10:28:39Z |
Publication Date | 2021 |
Publication Name | Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications |
Resource | Scopus |
Abstract | The zero-trust principle explicitly verifies that the authentication and authorization of all actions are performed regardless of the requesting user's credentials or permissions. This chapter presents the details of a mechanism that is capable of mitigating physical data exfiltration attacks, with a focus on physical vulnerabilities that can be exploited by insiders to acquire unauthorized access to sensitive information. First, it provides a critical review of recent prominent related literature around data exfiltration and the technologies utilized to perform it with a review of the current academic research. The chapter then proposes a defense mechanism that can protect systems against physical methods of data exfiltration attacks. Next, it critically analyzes the proposed defense mechanism and determines its viability as a solution that could be used for real-world scenarios of protecting against data exfiltration attacks. |
Language | en |
Publisher | wiley |
Subject | Data exfiltration attacks Defence mechanisms Physical data exfiltration mitigation Zero trust security principles |
Type | Book chapter |
Pagination | 57-89 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Information Intelligence [93 items ]