Applying zero trust security principles to defence mechanisms against data exfiltration attacks
| Author | Egerton, Hugo | 
| Author | Hammoudeh, Mohammad | 
| Author | Unal, Devrim | 
| Author | Adebisi, Bamidele | 
| Available date | 2023-12-05T10:28:39Z | 
| Publication Date | 2021 | 
| Publication Name | Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications | 
| Resource | Scopus | 
| Abstract | The zero-trust principle explicitly verifies that the authentication and authorization of all actions are performed regardless of the requesting user's credentials or permissions. This chapter presents the details of a mechanism that is capable of mitigating physical data exfiltration attacks, with a focus on physical vulnerabilities that can be exploited by insiders to acquire unauthorized access to sensitive information. First, it provides a critical review of recent prominent related literature around data exfiltration and the technologies utilized to perform it with a review of the current academic research. The chapter then proposes a defense mechanism that can protect systems against physical methods of data exfiltration attacks. Next, it critically analyzes the proposed defense mechanism and determines its viability as a solution that could be used for real-world scenarios of protecting against data exfiltration attacks. | 
| Language | en | 
| Publisher | wiley | 
| Subject | Data exfiltration attacks Defence mechanisms Physical data exfiltration mitigation Zero trust security principles  | 
| Type | Book chapter | 
| Pagination | 57-89 | 
Files in this item
| Files | Size | Format | View | 
|---|---|---|---|
| 
 There are no files associated with this item.  | 
|||
This item appears in the following Collection(s)
- 
Information Intelligence [100 items ]
 

