2020
DOI: 10.1007/978-3-030-39749-4_10
|View full text |Cite
|
Sign up to set email alerts
|

A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 32 publications
0
2
0
Order By: Relevance
“…Attacks on EC systems can be surfaced due to human errors or perpetuated by insiders and adversaries. The stimuli for cyber-attacks could be the system's limitations, incorrect configurations, design flaws, vulnerabilities, and inability to analyze potential threats to them [93]. The artifacts, i.e., attack targets, can be virtualization technologies, IoT applications, data storage, network connections, interfaces, and connectors across the EC layers.…”
Section: System's Availabilitymentioning
confidence: 99%
“…Attacks on EC systems can be surfaced due to human errors or perpetuated by insiders and adversaries. The stimuli for cyber-attacks could be the system's limitations, incorrect configurations, design flaws, vulnerabilities, and inability to analyze potential threats to them [93]. The artifacts, i.e., attack targets, can be virtualization technologies, IoT applications, data storage, network connections, interfaces, and connectors across the EC layers.…”
Section: System's Availabilitymentioning
confidence: 99%
“…For example, in a recent work, authors have discussed the human factors (misconfiguration of various features such as permissions, network access etc.) for Android security threats and proposed solutions to minimize human roles by analyzing the granted security at runtime and revoking them as required; many of these misconfigurations are also caused by the physical appearance of the smartphone [5].…”
Section: Introductionmentioning
confidence: 99%