2021
DOI: 10.1007/s13198-021-01236-2
|View full text |Cite
|
Sign up to set email alerts
|

Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…The secure source code essential can be considered in the former case, and security requirements in the latter case because the assessment may mean validation of requirements and specifications. The meaning might be different whether the assessment was conducted offline or online ‎[9]. Some of these ambiguities might come from English words that can be mapped to different logical interpretations and cannot be removed from the course description by automation specialists.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The secure source code essential can be considered in the former case, and security requirements in the latter case because the assessment may mean validation of requirements and specifications. The meaning might be different whether the assessment was conducted offline or online ‎[9]. Some of these ambiguities might come from English words that can be mapped to different logical interpretations and cannot be removed from the course description by automation specialists.…”
Section: Discussionmentioning
confidence: 99%
“…When issuing certificates and transcripts to students from universities that use two different names for the same courses and programs, and both are recognized by one authority or ministry, the only difference is the name of the course. According to the master's program in cybersecurity at the University of Nevada 9 , the reason behind this difference may simply come down to regional preference-American authors tend to use cybersecurity as one word, whereas British professionals tend to use two words for cyber security. Regardless of this difference, the recommendation is to unify the term.…”
Section: Secure Design Principlesmentioning
confidence: 99%
“…The malicious actor could then log on as a domain administrator using the PKINIT authentication defined in RFC 4556. A compromised AD allows malicious actors to potentially gain access to the network's most vital systems and resources, or obtain administrator privileges, thereby allowing control over the entire domain (Ebad, 2022).…”
Section: Microsoft Ndes Security Risksmentioning
confidence: 99%
“…Such a method fails the psychological acceptability principle. Users have been harangued for decades to pick hard-to-guess passwords, not share them, not use the same one in multiple places, and so on [22]. In reality, several people do not comply those rules [9].…”
Section: ) Are There Any Contradictions Ormentioning
confidence: 99%