IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Privilege Escalation: Threats, Prevention, and a Case Study

Privilege Escalation: Threats, Prevention, and a Case Study
View Sample PDF
Author(s): Gencay Özdemir (Ahmet Yesevi University, Turkey)and Gurkan Tuna (Trakya University, Turkey)
Copyright: 2024
Pages: 37
Source title: Cases on Forensic and Criminological Science for Criminal Detection and Avoidance
Source Author(s)/Editor(s): Anna Chaussée (University of Winchester, UK)and Liam James Leonard (University of Winchester, UK)
DOI: 10.4018/978-1-6684-9800-2.ch007

Purchase

View Privilege Escalation: Threats, Prevention, and a Case Study on the publisher's website for pricing and purchasing information.

Abstract

Considering we use technology in almost every area of our daily life, and the fact that the internet has become a part of our lives, the size of the risks and threats it brings has grown considerably. The expansion of the cyber environment day by day has transformed cyber attack methods into a system that updates itself day by day. Many methods continue to be developed to ensure information security in the cyberspace environment. The main objective of this chapter is to examine the vulnerabilities of privilege escalation used by cyber attackers and to explain what can be encountered in possible attack scenarios; measures that can be taken and methods that can be applied.

Related Content

Anna Chaussée. © 2024. 30 pages.
Julio de Carvalho Ponce. © 2024. 19 pages.
Julia de Oliveira. © 2024. 29 pages.
Gopala Sasie Rekha. © 2024. 23 pages.
Siddharth Kanojia. © 2024. 21 pages.
Kiranbhai Ramabhai Dodiya, Sai Niveditha Varayogula, B. V. Gohil. © 2024. 28 pages.
Gencay Özdemir, Gurkan Tuna. © 2024. 37 pages.
Body Bottom