Have a personal or library account? Click to login
Case Study: Security of System for Remote Management of Windows Cover

Case Study: Security of System for Remote Management of Windows

Open Access
|Nov 2022

References

  1. [1] R. Sobers: 110 Must-Know Cybersecurity Statistics for 2020, Inside Out Security Blog, 2020, Available at: https://www.varonis.com/blog/cybersecurity-statistics/
  2. [2] S. Baraković, et al.: Security Issues in Wireless Networks: An Overview, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775732
  3. [3] C. Crane: The Top Cyber Security Trends in 2019 (and What to Expect in 2020), 2019, Available at: https://www.thesslstore.com/blog/the-top-cyber-security-trends-in-2019-and-what-to-expect-in-2020/
  4. [4] Verzion: Data Breach Investigations Report, 201910.1016/S1361-3723(19)30060-0
  5. [5] RSA: 2019 Current State of Cybercrime - The Digital Transformation of Cybercrime, 2019, Available at: https://www.rsa.com/content/dam/en/white-paper/2019-current-state-of-cybercrime.pdf
  6. [6] Malwarebytes LABS: Cybercrime tactics and techniques Q1 2019, 2019, Available at: https://resources.malwarebytes.com/files/2019/04/MWB-CTNT-2019-state-of-malware_FINAL.pdf10.1016/S1361-3723(19)30049-1
  7. [7] Ponemon Institute: Staffing the IT Security Function in the Age of Automation: A Study of Organizations in the United States, United Kingdom and APAC, 2019, Available at: https://www.domaintools.com/content/2019-ponemon-report-staffing-it-age-automation.pdf
  8. [8] IDC: Worldwide Spending on Security Solutions Forecast to Reach $103.1 Billion in 2019, According to a New IDC Spending Guide, 2019, Available at: https://www.idc.com/getdoc.jsp?container-Id=prUS44935119
  9. [9] NetAcad: CCNA Security, 2019
  10. [10] S. Baraković, J. Baraković Husić: Short and Sweet: Cloud Computing and Its Security, Proceedings of the 11th International Symposium on Telecommunications, (BIHTEL 2016), Sarajevo, Bosnia and Herzegovina, 201610.1109/BIHTEL.2016.7775725
  11. [11] OWASP: Top 10 Web Application Security Risks, 2019, Available at: https://owasp.org/www-project-top-ten/
  12. [12] K. D. Mitnick, W. L. Simon. The Art of Deception: Controlling the Human Element of Security. Wiley, 1st edition, 2003
  13. [13] M. Curphey, J. Scambray, E. Olson: Improving Web Application Security, Threats and Countermeasures, 2003
  14. [14] N. Shevchenko, T. A. Chick, P. O’Riordan, T. Scan-lon, C. Woody: Threat modeling: A summary of available methods, 2018, Available: https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=524448
  15. [15] A. Shostack: Threat Modeling: Designing for Security. John Wiley & Sons, Inc., 2014
  16. [16] M. Haider: Application Threat Modelling using DREAD and STRIDE, Infosec Blog, 2017, Available at: https://haiderm.com/application-threat-modeling-using-dread-and-stride/
  17. [17] R. Shahan: Azure Internet of Things: Internet of Things (IoT) security architecture, Microsoft Azure, 2018, Available at: https://docs.microsoft.com/enus/azure/iot-fundamentals/iot-security-architecture.
  18. [18] M. Kovatsch, R. Matsukura, M. Lagally, T. Kawaguchi, K. Toumura, K. Kajimoto: WoT architecture, W3C, 2020, Available at: https://www.w3.org/TR/wot-architecture/
  19. [19] Microsoft Corporation: Threat Modeling: Microsoft Threat Modeling Tool, 2020, Available at: https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
DOI: https://doi.org/10.2478/bhee-2020-0007 | Journal eISSN: 2566-3151 | Journal ISSN: 2566-3143
Language: English
Page range: 4 - 12
Submitted on: Mar 1, 2020
Accepted on: May 1, 2020
Published on: Nov 1, 2022
Published by: Bosnia and Herzegovina National Committee CIGRÉ
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2022 Tarik Dervišević, Sabina Baraković, Jasmina Baraković Husić, published by Bosnia and Herzegovina National Committee CIGRÉ
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.