Zero day exploits and national readiness for cyber-warfare
Autor: | Ayei E. Ibor |
---|---|
Rok vydání: | 2018 |
Předmět: |
Exploit
Computer science media_common.quotation_subject Vulnerability Espionage 02 engineering and technology Computer security computer.software_genre Critical infrastructure 03 medical and health sciences Cyberwarfare 0302 clinical medicine State (polity) Software deployment 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing 030212 general & internal medicine Cyberspace exploits zero day vulnerability cyberspace cyber-warfare computer media_common |
Zdroj: | Nigerian Journal of Technology; Vol 36, No 4 (2017); 1174-1183 |
ISSN: | 2467-8821 0331-8443 |
DOI: | 10.4314/njt.v36i4.26 |
Popis: | A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly reported or announced. But how should a nation react to a zero day? This question is a concern for most national governments, and one that requires a systematic approach for its resolution. The securities of critical infrastructure of nations and states have been severally violated by cybercriminals. Nation-state espionage and the possible disruption and circumvention of the security of critical networks has been on the increase. Most of these violations are possible through detectable operational bypasses, which are rather ignored by security administrators. One common instance of a detectable operational bypass is the non-application of periodic security updates and upgrades from software and hardware vendors. Every software is not necessarily in its final state, and the application of periodic updates allow for the patching of vulnerable systems, making them to be secure enough to withstand an exploit. To have control over the security of critical national assets, a nation must be “cyber-ready” through the proper management of vulnerabilities and the deployment of the rightful technology in the cyberspace for hunting, detecting and preventing cyber-attacks and espionage. To this effect, this paper discusses the implications of zero day exploits and highlights the dangers posed by this cankerworm for an unprepared nation. The paper also adopts the defence-in-depth strategy for national readiness and a foolproof system that enforces the security of critical national infrastructure at all levels. Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare |
Databáze: | OpenAIRE |
Externí odkaz: |