Basic Concepts and Models of Cybersecurity

15Citations
Citations of this article
75Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This introductory chapter reviews the fundamental concepts of cybersecurity. It begins with common threats to information and systems to illustrate how matters of security can be addressed with methods from risk management. In the following, typical attack strategies and principles for defence are reviewed, followed by cryptographic techniques, malware and two common weaknesses in software: buffer overflows and SQL injections. Subsequently, selected topics from network security, namely reconnaissance, firewalls, Denial of Service attacks, and Network Intrusion Detection Systems, are analysed. Finally, the chapter reviews techniques for continuous testing, stressing the need for a free distribution of dual-use tools. Although introductory in nature, this chapter already addresses a number of ethical issues. For instance, well-intended security mechanisms may have undesired side effects such as leaking sensitive information to attackers. As asymmetries and externalities are at the core of many security problems, devising effective security solutions that are adopted in practice is a challenge.

Cite

CITATION STYLE

APA

Herrmann, D., & Pridöhl, H. (2020). Basic Concepts and Models of Cybersecurity. In International Library of Ethics, Law and Technology (Vol. 21, pp. 11–44). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-29053-5_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free