This paper presents 8 of the most significant computer hacking events (also known as computer attacks). These events were selected because of their unique impact, methodology, or other properties. A temporal computer attack model is presented that can be used to model computer based attacks. This model consists of the following stages: Target Identification, Reconnaissance, Attack, and Post-Attack Reconnaissance stages. The Attack stage is separated into: Ramp-up, Damage and Residue. This paper demonstrates how our 18 significant hacking events are mapped to the temporal computer attack model. The temporal computer attack model becomes a valuable asset in the protection of critical infrastructure by being able to detect similar attacks earlier.
Reference:
Van Heerden, R, Pieterse, H and Irwin, B. Mapping the most significant computer hacking events to a temporal computer attack model. IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012
Van Heerden, R. P., Pieterse, H., & Irwin, B. (2012). Mapping the most significant computer hacking events to a temporal computer attack model. Springer. http://hdl.handle.net/10204/6405
Van Heerden, Renier P, Heloise Pieterse, and B Irwin. "Mapping the most significant computer hacking events to a temporal computer attack model." (2012): http://hdl.handle.net/10204/6405
Van Heerden RP, Pieterse H, Irwin B, Mapping the most significant computer hacking events to a temporal computer attack model; Springer; 2012. http://hdl.handle.net/10204/6405 .
IFIP's Human Choice and Computers, International Conference 10 (HCC10), ICT Critical Infrastructures and Society, VU University Amsterdam, 27-28 September 2012. Published in IFIP Advances in Information and Communication Technology Volume 386, 2012, pp 226-236.
Author:Khumalo, Nosipho N; Oyerinde, O; Mfupe, Luzango PDate:Aug 2019The fifth generation (5G) of wireless network ecosystem which is expected to be deployed in 2020 promises to provide higher speeds, higher capacity and lower latency than the current mobile networks. 5G is also envisioned to revolutionise the ...Read more
Author:Khumalo, Nosipho N; Oyerinde, O; Mfupe, Luzango PDate:Aug 2019The fifth generation (5G) of wireless network ecosystem which is expected to be deployed in 2020 promises to provide higher speeds, higher capacity and lower latency than the current mobile networks. 5G is also envisioned to revolutionise the ...Read more
Author:Mxoli, Ncedisa AM; Mostert, N; Gerber, MDate:Mar 2019Traditionally, health records have been stored in paper folders at the physician’s consulting rooms - or at the patient’s home. With the rise of technology there have been many offerings of ways to store health records in a safer and better ...Read more