IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Privilege Escalation: Threats, Prevention, and a Case Study

Author(s): Gencay Özdemir (Ahmet Yesevi University, Turkey)and Gurkan Tuna (Trakya University, Turkey)
Copyright: 2024
Pages: 37
EISBN13: 9798369373156

Purchase

View Privilege Escalation: Threats, Prevention, and a Case Study on the publisher's website for pricing and purchasing information.

View Sample PDF


Abstract

Considering we use technology in almost every area of our daily life, and the fact that the internet has become a part of our lives, the size of the risks and threats it brings has grown considerably. The expansion of the cyber environment day by day has transformed cyber attack methods into a system that updates itself day by day. Many methods continue to be developed to ensure information security in the cyberspace environment. The main objective of this chapter is to examine the vulnerabilities of privilege escalation used by cyber attackers and to explain what can be encountered in possible attack scenarios; measures that can be taken and methods that can be applied.

Related Content

Peggy J. Schaefer Whitby. © 2020. 15 pages.
Terri Toles Patkin. © 2010. 11 pages.
Martin Parsons, Mikel Garant. © 2022. 20 pages.
Barbara J. Haley, Hugh J. Watson, Dale L. Goodhue. © 1999. 12 pages.
Prince Hycy Bull. © 2013. 31 pages.
Body Bottom