Information Security Report: Cyber Attacks and Security Breaches 2017
VerifiedAdded on 2020/02/24
|12
|2768
|43
Report
AI Summary
This report provides an analysis of significant cyber attacks and security breaches that occurred between April and August 2017. Part A focuses on a massive data breach affecting 198 million US voters, detailing the event, the compromised information, and potential remedies. The report highlights the role of Deep Root Analytics and the vulnerabilities that led to the leak. Part B delves into the WannaCry ransomware attacks, examining its impact on Microsoft Windows systems, the method of operation, and the defenses implemented, including the "kill-switch" and the financial losses incurred. The report concludes with recommendations for improved security practices, emphasizing the importance of updated software versions, risk management, and the avoidance of suspicious websites.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: INFORMATION SECURITY
INFORMATION SECURITY
Name of the student
Name of the university
Author note
INFORMATION SECURITY
Name of the student
Name of the university
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1SECURITY INTERRUPTS
Executive Summary
The report deals with the Cyber attacks and computer security breaches that took place during
April- August 2017. While Part A deals with American voters being compromised in a cyber
leak, Part B deals with the ransomware attacks, which took the world by storm in early 2017.
Executive Summary
The report deals with the Cyber attacks and computer security breaches that took place during
April- August 2017. While Part A deals with American voters being compromised in a cyber
leak, Part B deals with the ransomware attacks, which took the world by storm in early 2017.

2SECURITY INTERRUPTS
Table of Contents
Part A.........................................................................................................................................3
Introduction............................................................................................................................3
The event................................................................................................................................3
The people whose details were compromised........................................................................4
Remedies to such leaks..........................................................................................................5
Conclusion..............................................................................................................................5
Part B..........................................................................................................................................6
Introduction............................................................................................................................6
The event................................................................................................................................6
The remedy.............................................................................................................................8
Conclusion..................................................................................................................................8
References:...............................................................................................................................10
Table of Contents
Part A.........................................................................................................................................3
Introduction............................................................................................................................3
The event................................................................................................................................3
The people whose details were compromised........................................................................4
Remedies to such leaks..........................................................................................................5
Conclusion..............................................................................................................................5
Part B..........................................................................................................................................6
Introduction............................................................................................................................6
The event................................................................................................................................6
The remedy.............................................................................................................................8
Conclusion..................................................................................................................................8
References:...............................................................................................................................10

3SECURITY INTERRUPTS
Part A
Introduction
It is not that uncommon to hear that voters data bases has been exposed or breached
somewhere around the world. However, a massive breach which affected the lives of a
whopping 198 million US voters is something unheard off. This was one of the largest data
exposure in the history of USA, where the Cyber Risk Team who enquired into it found out
that personal details of over 198 million of American voters were up on the web. It was later
known that a firm who were working for Donald Trump had accidently triggered the massive
leak.
The event
On June 19, 2017 UpGuard’s cyber risk analyst Chris Vickery found an open cloud
repository as he was looking for some misconfigured data sources for his company. The
repository which was an Amazon Web Service S3 bucket did not have any firewall and was
easily accessible to common mass of people (Varia & Mathew, 2014). Anyone using the
internet could have had access to the files which helped Donald Trump become the president
by simply going to the Amazon sub domain: “dra-dw.” “Dra-dw’ usually is known as “Deep
root Analytics Data Warehouse” and is quite common in businesses nowadays. It is actually a
huge collection of data which are used for very complex calculations. The leak could have led
to a widespread breach in security if Vickery had not noticed it and notified the concerned
authorities (Pfleeger & Caputo, 2012). Deep Root Analytics revealed that they were in charge
of the bucket which was later secured against public access.
There was 1.1 terabytes of data in the “dra-dw” which is an amount which is close to
500 hours of video. It could be downloaded and the amount of data accessible was huge. In
Part A
Introduction
It is not that uncommon to hear that voters data bases has been exposed or breached
somewhere around the world. However, a massive breach which affected the lives of a
whopping 198 million US voters is something unheard off. This was one of the largest data
exposure in the history of USA, where the Cyber Risk Team who enquired into it found out
that personal details of over 198 million of American voters were up on the web. It was later
known that a firm who were working for Donald Trump had accidently triggered the massive
leak.
The event
On June 19, 2017 UpGuard’s cyber risk analyst Chris Vickery found an open cloud
repository as he was looking for some misconfigured data sources for his company. The
repository which was an Amazon Web Service S3 bucket did not have any firewall and was
easily accessible to common mass of people (Varia & Mathew, 2014). Anyone using the
internet could have had access to the files which helped Donald Trump become the president
by simply going to the Amazon sub domain: “dra-dw.” “Dra-dw’ usually is known as “Deep
root Analytics Data Warehouse” and is quite common in businesses nowadays. It is actually a
huge collection of data which are used for very complex calculations. The leak could have led
to a widespread breach in security if Vickery had not noticed it and notified the concerned
authorities (Pfleeger & Caputo, 2012). Deep Root Analytics revealed that they were in charge
of the bucket which was later secured against public access.
There was 1.1 terabytes of data in the “dra-dw” which is an amount which is close to
500 hours of video. It could be downloaded and the amount of data accessible was huge. In
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4SECURITY INTERRUPTS
addition to this there was 24 terbabytes of data which was stored but these were prevented
from public access. Ultimately the data stored in the misconfigured database was equal to 10
billion pages of text (Brodie, Mylopoulos & Schmidt, 2012).
The people whose details were compromised
The ones that were accessible however, had detailed profiles of 198 million registered
voters which meant that almost everybody who were eligible to vote in 2016 election were
there (Fowler, 2015). It exposed people right from locations in Mexico and Phillippines to
that in Georgia. The information on the voters to dated back to more than 10 years. However,
this information that was leaked was not stolen by hackers. It was moved to a server which
did not have the necessary security (Solms & Niekerk, 2013). According to Vickery there
was not even a password to protect it. Any man, woman, child with the link could click on it
and have every information on all voters in America.
Vickery says the data came from different sources and were merged together by the
analytics company. Some of these information were publicly available like in voter rolls.
Others came from social networks and consulting groups like Kantar Research and PAC’s.
When Deep Root was asked by Forbes as to how the leak happened they said that they were
conducting an internal review and have brought in cyber security firm Stroz Friedberg to
make an in-depth investigation (Wang & Lu 2013).
This is a type of leak which can happen anytime despite measures being taken. These
information can be damaging at times for people. Even though it is not a work done by the
hackers, and are misconfigurations relating to servers, these lead to such cybersecurity risks
(Zhang et al., 2014).
addition to this there was 24 terbabytes of data which was stored but these were prevented
from public access. Ultimately the data stored in the misconfigured database was equal to 10
billion pages of text (Brodie, Mylopoulos & Schmidt, 2012).
The people whose details were compromised
The ones that were accessible however, had detailed profiles of 198 million registered
voters which meant that almost everybody who were eligible to vote in 2016 election were
there (Fowler, 2015). It exposed people right from locations in Mexico and Phillippines to
that in Georgia. The information on the voters to dated back to more than 10 years. However,
this information that was leaked was not stolen by hackers. It was moved to a server which
did not have the necessary security (Solms & Niekerk, 2013). According to Vickery there
was not even a password to protect it. Any man, woman, child with the link could click on it
and have every information on all voters in America.
Vickery says the data came from different sources and were merged together by the
analytics company. Some of these information were publicly available like in voter rolls.
Others came from social networks and consulting groups like Kantar Research and PAC’s.
When Deep Root was asked by Forbes as to how the leak happened they said that they were
conducting an internal review and have brought in cyber security firm Stroz Friedberg to
make an in-depth investigation (Wang & Lu 2013).
This is a type of leak which can happen anytime despite measures being taken. These
information can be damaging at times for people. Even though it is not a work done by the
hackers, and are misconfigurations relating to servers, these lead to such cybersecurity risks
(Zhang et al., 2014).

5SECURITY INTERRUPTS
The files started with the voter’s first and last names, therefore there was no way to
mask the identities of the voters. The files also revealed a lot of more data like the voter’s
address, mailing address, phone number, registered party, demography, date of birth, voter
registration status and also if they are on the “Do Not Call” list. Also given were the religion
and ethnicity of the voter.
Remedies to such leaks
To avoid such a leak again analysts point to a few remedies which can help in
lessening the number of misconfigured servers which exposes private data on the web.
Next people need to be made aware about these leaks. Organizations will have to be
motivated to build resources such as setting up servers and maintaining them properly.
Another step can be to make default settings for databases in the cloud tighter so that security
cannot be compromised (Refsdal, Solhaug & Stølen, 2015). Some security companies have
already started creating software which can scan systems setup and warn tech people if
something lies unprotected or gets exposed. This is something that UpGuard did in the case to
avoid the leak from wreaking havoc.
This case joins other database misconfiguration incidents like the Hollywood screener
system, Microsoft sites and dating services.
Conclusion
The exposure has raised quite a few questions on security and privacy of Americans.
This also happened at a time when there had been a lot of cyber assaults in the country
against state voter databases. What is quite troubling is that such a huge national database of
voters was created and placed online without even the simplest protections against public
access. It also questions the roles and responsibilities of private organizations who are in
charge to maintain these confidential data. One only shudders to think what could have
The files started with the voter’s first and last names, therefore there was no way to
mask the identities of the voters. The files also revealed a lot of more data like the voter’s
address, mailing address, phone number, registered party, demography, date of birth, voter
registration status and also if they are on the “Do Not Call” list. Also given were the religion
and ethnicity of the voter.
Remedies to such leaks
To avoid such a leak again analysts point to a few remedies which can help in
lessening the number of misconfigured servers which exposes private data on the web.
Next people need to be made aware about these leaks. Organizations will have to be
motivated to build resources such as setting up servers and maintaining them properly.
Another step can be to make default settings for databases in the cloud tighter so that security
cannot be compromised (Refsdal, Solhaug & Stølen, 2015). Some security companies have
already started creating software which can scan systems setup and warn tech people if
something lies unprotected or gets exposed. This is something that UpGuard did in the case to
avoid the leak from wreaking havoc.
This case joins other database misconfiguration incidents like the Hollywood screener
system, Microsoft sites and dating services.
Conclusion
The exposure has raised quite a few questions on security and privacy of Americans.
This also happened at a time when there had been a lot of cyber assaults in the country
against state voter databases. What is quite troubling is that such a huge national database of
voters was created and placed online without even the simplest protections against public
access. It also questions the roles and responsibilities of private organizations who are in
charge to maintain these confidential data. One only shudders to think what could have

6SECURITY INTERRUPTS
happened had the data got into the hands of criminals. Identity theft, fraud, corporate
marketing spam, advanced political targeting could all have been possible with 198 million of
American voters. Any of these information which were leaked can be easily prevented if the
organizations holding such data can obey a few simple rules before uploading them on the
databases.
Part B
Introduction
First six months of 2017 faced an unexpected number of cyber-protection challenges.
Among many was the scary launch of the WannaCry ransomware, critically targeting the
Microsoft Windows operating systems (Shoukry et al., 2017). This report in particular
highlights the impact of the ransomware and possible defenses against the attack, presented
by analysts and researchers. Vulnerability in the traits of Microsoft operating system proved
to be beneficial for the hackers.
The event
The ransomware in discussion operated in a mode to encrypt the main file system of a
system and potentially claimed ransom in bit-coins, a currency in Crypto-currency, a digital
infrastructure for payments. Precisely on 12 May 2017, the world witnessed the release and
impact of this attack, with continuation until 15th of the month (Martin, Kinross & Hankin,
2017). Reports of infected computers, the approx total being 230,000 emerged out to media.
The ransomware benefited from the existing limitation of Microsoft earlier discovered by
National Security Agency (NSA), which took advantage of the same for their self-offensive
commandments. The hackers in a way leaked this flaw, to spread the malware widely for
monetary gain by blocking access to a file system. As a first step towards blocking, this
malware successfully disguises as software, projecting the threat to the user of encrypted files
happened had the data got into the hands of criminals. Identity theft, fraud, corporate
marketing spam, advanced political targeting could all have been possible with 198 million of
American voters. Any of these information which were leaked can be easily prevented if the
organizations holding such data can obey a few simple rules before uploading them on the
databases.
Part B
Introduction
First six months of 2017 faced an unexpected number of cyber-protection challenges.
Among many was the scary launch of the WannaCry ransomware, critically targeting the
Microsoft Windows operating systems (Shoukry et al., 2017). This report in particular
highlights the impact of the ransomware and possible defenses against the attack, presented
by analysts and researchers. Vulnerability in the traits of Microsoft operating system proved
to be beneficial for the hackers.
The event
The ransomware in discussion operated in a mode to encrypt the main file system of a
system and potentially claimed ransom in bit-coins, a currency in Crypto-currency, a digital
infrastructure for payments. Precisely on 12 May 2017, the world witnessed the release and
impact of this attack, with continuation until 15th of the month (Martin, Kinross & Hankin,
2017). Reports of infected computers, the approx total being 230,000 emerged out to media.
The ransomware benefited from the existing limitation of Microsoft earlier discovered by
National Security Agency (NSA), which took advantage of the same for their self-offensive
commandments. The hackers in a way leaked this flaw, to spread the malware widely for
monetary gain by blocking access to a file system. As a first step towards blocking, this
malware successfully disguises as software, projecting the threat to the user of encrypted files
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7SECURITY INTERRUPTS
and of the blocked access with a payment demand and deletion warning. Alongside with
directions of the mode of payment and designated addresses for the same was provided to the
user. Analysts held a case study to coat this ransomware as a ‘worm’, as this was projecting a
similar transfer mechanism infecting systems around gradually. The codes of operation
involved the detection of vulnerability present in MS systems, which is Eternal Blue to
develop access to systems. Hackers, for next attempt, invented a variant of WannaCry,
‘Mirai’.
Europol conducted a study to discover about 200,000 computers being infected over
150 countries approximately (O’Dowd, 2017). Kaspersky lab presented inventory results
about the majorly affected regions including Russia, Ukraine, India and Taiwan. National
Health Services (NHS) located in England and Scotland was adversely affected. Numerous
public utilities approximately amounting to 70,000 ranging from computers, MRI-Scanners,
blood storage refrigerators to other theatrical equipments (Collier, 2017). Emergencies got
terminated, ambulance services were halted, relative to NHS, even in Wales and Ireland
retuned from work. Grand organizations as Nissan Motor Manufacturing UK in Tyne &
Wear, England called the production off for the day; similarly, Renault Company also
stopped the production to avoid any system-risks (Mattei, 2017). Absence of Microsoft
updated versions in organization left them pore to the attack in a more adverse way, since no
security patches were released for the XP versions ever since April 2014. Cyence configured
a financial loss estimated to be about 44 billion while others derived a loss summing up to
$130,634.77 surrounding 327 payments in relevance to the ransomware release.
WannaCry initiated the attack in Asia as reported. SMB provided the ransomware the
access to the main system, which was automated to spread through various networks. The
malware proceeds following certain steps, to gain access to the systems around. Firstly, the
malware performs a scan on the systems to detect ‘kill-Switch’ domain. In its absence it
and of the blocked access with a payment demand and deletion warning. Alongside with
directions of the mode of payment and designated addresses for the same was provided to the
user. Analysts held a case study to coat this ransomware as a ‘worm’, as this was projecting a
similar transfer mechanism infecting systems around gradually. The codes of operation
involved the detection of vulnerability present in MS systems, which is Eternal Blue to
develop access to systems. Hackers, for next attempt, invented a variant of WannaCry,
‘Mirai’.
Europol conducted a study to discover about 200,000 computers being infected over
150 countries approximately (O’Dowd, 2017). Kaspersky lab presented inventory results
about the majorly affected regions including Russia, Ukraine, India and Taiwan. National
Health Services (NHS) located in England and Scotland was adversely affected. Numerous
public utilities approximately amounting to 70,000 ranging from computers, MRI-Scanners,
blood storage refrigerators to other theatrical equipments (Collier, 2017). Emergencies got
terminated, ambulance services were halted, relative to NHS, even in Wales and Ireland
retuned from work. Grand organizations as Nissan Motor Manufacturing UK in Tyne &
Wear, England called the production off for the day; similarly, Renault Company also
stopped the production to avoid any system-risks (Mattei, 2017). Absence of Microsoft
updated versions in organization left them pore to the attack in a more adverse way, since no
security patches were released for the XP versions ever since April 2014. Cyence configured
a financial loss estimated to be about 44 billion while others derived a loss summing up to
$130,634.77 surrounding 327 payments in relevance to the ransomware release.
WannaCry initiated the attack in Asia as reported. SMB provided the ransomware the
access to the main system, which was automated to spread through various networks. The
malware proceeds following certain steps, to gain access to the systems around. Firstly, the
malware performs a scan on the systems to detect ‘kill-Switch’ domain. In its absence it

8SECURITY INTERRUPTS
becomes easier for the malware to encrypt the files. The ransom enclosed a sum of $300
when paid within 3 days while it escalated up to $600 in limit of 7 days through bit-coins.
Web- addresses assigned for the collection of the payments had labels ‘wallets’ to register the
money (Gandhi, 2017). Three distinct segments are present in relevance to the execution of
the malware. The initial display is the Payload (mssecsvc.exe): this program performs the
encryption of the files and results in malicious activities. Next is the ransom program
(taskche.exe): as recorded the program itself withholds an encrypted key, the decrypt part is
secured with the attacker, which is enabled to decrypt both the sub-private as well as public
key and saves the same. AES key potentially encrypts the file contents as M2, which is
destined to be saved as M1. This collaborated version contains a header ‘WANNACRY’.
Finally, the ransom program- (@WannaDecrypt@.exe): provides information about the
demands to be fulfilled in bit-coins (Mohurle, & Patil, 2017).
The remedy
Marcus Hutchins, a tech-security expert, situated in England built successfully a
vaccine against this termed as ‘kill-Switch’, a formerly registered domain technique reducing
the wild spread of the malware. This domain effectively terminates the software. To prevent
its transfer in quarantined devices this particular domain was present in the malware-codes.
This was not able to cure infected alignments but surely limited the spread in North America
and Asia. Several experts from universities of London and Boston claimed resolutions to the
impact of the attack (Knobel, 2017). Based on the use of AES key to decrypt RSA sub-
private key, researchers discovered tools namely, ‘WannaKey’ and ‘WannaKiwi’ providing
help to retrieve keys of concern, former for Windows XP and later for Windows 7 and 2008
R2 systems.
becomes easier for the malware to encrypt the files. The ransom enclosed a sum of $300
when paid within 3 days while it escalated up to $600 in limit of 7 days through bit-coins.
Web- addresses assigned for the collection of the payments had labels ‘wallets’ to register the
money (Gandhi, 2017). Three distinct segments are present in relevance to the execution of
the malware. The initial display is the Payload (mssecsvc.exe): this program performs the
encryption of the files and results in malicious activities. Next is the ransom program
(taskche.exe): as recorded the program itself withholds an encrypted key, the decrypt part is
secured with the attacker, which is enabled to decrypt both the sub-private as well as public
key and saves the same. AES key potentially encrypts the file contents as M2, which is
destined to be saved as M1. This collaborated version contains a header ‘WANNACRY’.
Finally, the ransom program- (@WannaDecrypt@.exe): provides information about the
demands to be fulfilled in bit-coins (Mohurle, & Patil, 2017).
The remedy
Marcus Hutchins, a tech-security expert, situated in England built successfully a
vaccine against this termed as ‘kill-Switch’, a formerly registered domain technique reducing
the wild spread of the malware. This domain effectively terminates the software. To prevent
its transfer in quarantined devices this particular domain was present in the malware-codes.
This was not able to cure infected alignments but surely limited the spread in North America
and Asia. Several experts from universities of London and Boston claimed resolutions to the
impact of the attack (Knobel, 2017). Based on the use of AES key to decrypt RSA sub-
private key, researchers discovered tools namely, ‘WannaKey’ and ‘WannaKiwi’ providing
help to retrieve keys of concern, former for Windows XP and later for Windows 7 and 2008
R2 systems.

9SECURITY INTERRUPTS
Conclusion
Analysis of the reports, help us conclude that the intensity of the attack and the leaked
vulnerabilities of the systems resulted in the enactment of updates for Windows versions. As
a self-security, avoidance of suspicious sites with malicious behaviors is necessary. Finally,
payment regarding a ransomware should not be supported as it encourages hackers.
Prevention before cure should be the mantra. Updated versions should be in notice of the
users to protect their valuable file system. Solutions by the analysts, towards this malware
were commendable. Risk-management should be promoted.
Conclusion
Analysis of the reports, help us conclude that the intensity of the attack and the leaked
vulnerabilities of the systems resulted in the enactment of updates for Windows versions. As
a self-security, avoidance of suspicious sites with malicious behaviors is necessary. Finally,
payment regarding a ransomware should not be supported as it encourages hackers.
Prevention before cure should be the mantra. Updated versions should be in notice of the
users to protect their valuable file system. Solutions by the analysts, towards this malware
were commendable. Risk-management should be promoted.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10SECURITY INTERRUPTS
References:
Brodie, M. L., Mylopoulos, J., & Schmidt, J. W. (Eds.). (2012). On conceptual modelling:
Perspectives from artificial intelligence, databases, and programming languages.
Springer Science & Business Media.
Collier, R. (2017). NHS ransomware attack spreads worldwide.
Fowler, A. (2015). Regular voters, marginal voters and the electoral effects of turnout.
Political Science Research and Methods, 3(2), 205-219.
Gandhi, K. A. (2017). Survey on Ransomware: A New Era of Cyber Attack. International
Journal of Computer Applications, 168(3).
Knobel, A. (2017). Technology and online beneficial ownership registries: easier to create
companies and better at preventing financial crimes.
Martin, G., Kinross, J., & Hankin, C. (2017). Effective cybersecurity is fundamental to
patient safety.
Mattei, T. A. (2017). Privacy, Confidentiality, and Security of Health Care Information:
Lessons from the Recent WannaCry Cyberattack. World Neurosurgery, 104, 972-974.
Mohurle, S., & Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack
2017. International Journal, 8(5).
O’Dowd, A. (2017). NHS patient data security is to be tightened after cyberattack.
Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber
security risk. Computers & security, 31(4), 597-611.
References:
Brodie, M. L., Mylopoulos, J., & Schmidt, J. W. (Eds.). (2012). On conceptual modelling:
Perspectives from artificial intelligence, databases, and programming languages.
Springer Science & Business Media.
Collier, R. (2017). NHS ransomware attack spreads worldwide.
Fowler, A. (2015). Regular voters, marginal voters and the electoral effects of turnout.
Political Science Research and Methods, 3(2), 205-219.
Gandhi, K. A. (2017). Survey on Ransomware: A New Era of Cyber Attack. International
Journal of Computer Applications, 168(3).
Knobel, A. (2017). Technology and online beneficial ownership registries: easier to create
companies and better at preventing financial crimes.
Martin, G., Kinross, J., & Hankin, C. (2017). Effective cybersecurity is fundamental to
patient safety.
Mattei, T. A. (2017). Privacy, Confidentiality, and Security of Health Care Information:
Lessons from the Recent WannaCry Cyberattack. World Neurosurgery, 104, 972-974.
Mohurle, S., & Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack
2017. International Journal, 8(5).
O’Dowd, A. (2017). NHS patient data security is to be tightened after cyberattack.
Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber
security risk. Computers & security, 31(4), 597-611.

11SECURITY INTERRUPTS
Refsdal, A., Solhaug, B., & Stølen, K. (2015). Cyber-risk management. In Cyber-Risk
Management (pp. 33-47). Springer International Publishing.
Shoukry, Y., Nuzzo, P., Puggelli, A., Sangiovanni-Vincentelli, A. L., Seshia, S. A., &
Tabuada, P. (2017). Secure state estimation for cyber physical systems under sensor
attacks: a satisfiability modulo theory approach. IEEE Transactions on Automatic
Control.
Varia, J., & Mathew, S. (2014). Overview of amazon web services. Amazon Web Services.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security.
computers & security, 38, 97-102.
Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges.
Computer Networks, 57(5), 1344-1371.
Zhang, J., Renganarayana, L., Zhang, X., Ge, N., Bala, V., Xu, T., & Zhou, Y. (2014).
EnCore: Exploiting system environment and correlation information for
misconfiguration detection. ACM SIGPLAN Notices, 49(4), 687-700.
Refsdal, A., Solhaug, B., & Stølen, K. (2015). Cyber-risk management. In Cyber-Risk
Management (pp. 33-47). Springer International Publishing.
Shoukry, Y., Nuzzo, P., Puggelli, A., Sangiovanni-Vincentelli, A. L., Seshia, S. A., &
Tabuada, P. (2017). Secure state estimation for cyber physical systems under sensor
attacks: a satisfiability modulo theory approach. IEEE Transactions on Automatic
Control.
Varia, J., & Mathew, S. (2014). Overview of amazon web services. Amazon Web Services.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security.
computers & security, 38, 97-102.
Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges.
Computer Networks, 57(5), 1344-1371.
Zhang, J., Renganarayana, L., Zhang, X., Ge, N., Bala, V., Xu, T., & Zhou, Y. (2014).
EnCore: Exploiting system environment and correlation information for
misconfiguration detection. ACM SIGPLAN Notices, 49(4), 687-700.
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.