Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security Attack

Fostering Cross-Industry Sustainability With Intelligent Technologies
Is an attempt to exploit a security vulnerability in a system or network. Security attacks can be carried out by malicious actors, such as hackers, or by accidental means.
Published in Chapter:
Lightweight Cryptography for Cyber-Physical Systems: State of the Art
Agni Datta (VIT Bhopal University, India), Aditya Srivastav (VIT Bhopal University, India), and Thangavel Murugan (United Arab Emirates University, UAE)
DOI: 10.4018/979-8-3693-1638-2.ch026
Abstract
Cyber-physical systems (CPS) are the next generation of intelligent systems that combine the inherent and comprehensive embedding of communication and control technologies to integrate computational resources with hardware facilities. The CPS modules are more vulnerable to an attacker, raising the possibility of physical attacks that might compromise security. For the implementation of lightweight cryptography in CPS, difficulties generally include finding a balance between industrial requirements and publicly available research data. Lightweight cryptographic primitives have a smaller footprint than traditional cryptographic primitives. Lightweight cryptographic techniques are required in the CPS paradigm to minimize latency and resources. Lightweight ciphers' performance advantages include reduced block and key lengths, along with simplified key scheduling. This chapter examines the usage of lightweight cryptography in cyber-physical systems.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Big Data Security Management
An attempt to gain unauthorized access to information resource or services, or to cause harm or damage to information systems.
Full Text Chapter Download: US $37.50 Add to Cart
Cost Estimation and Security Investment of Security Projects
Is any form of malicious actions taken to harm the security of information system components. An action is classified as malicious with respect to the enterprise security policy.
Full Text Chapter Download: US $37.50 Add to Cart
Management and Cost Estimation of Security Projects
Any form of malicious or actions taken to harm the security of information system components. An action is classified as malicious with respect to the enterprise security policy.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR