The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Privilege Escalation: Threats, Prevention, and a Case Study
Abstract
Considering we use technology in almost every area of our daily life, and the fact that the internet has become a part of our lives, the size of the risks and threats it brings has grown considerably. The expansion of the cyber environment day by day has transformed cyber attack methods into a system that updates itself day by day. Many methods continue to be developed to ensure information security in the cyberspace environment. The main objective of this chapter is to examine the vulnerabilities of privilege escalation used by cyber attackers and to explain what can be encountered in possible attack scenarios; measures that can be taken and methods that can be applied.
Related Content
Peggy J. Schaefer Whitby.
© 2020.
15 pages.
|
Terri Toles Patkin.
© 2010.
11 pages.
|
Martin Parsons, Mikel Garant.
© 2022.
20 pages.
|
Barbara J. Haley, Hugh J. Watson, Dale L. Goodhue.
© 1999.
12 pages.
|
Prince Hycy Bull.
© 2013.
31 pages.
|
|
|