Privilege Escalation: Threats, Prevention, and a Case Study

Gencay Özdemir (Ahmet Yesevi University, Turkey) and Gurkan Tuna (Trakya University, Turkey)
Copyright: © 2024 |Pages: 187
EISBN13: 9798369373156|DOI: 10.4018/978-1-6684-9800-2.ch007
OnDemand PDF Download:
OnDemand PDF Download
Download link provided immediately after order completion


Considering we use technology in almost every area of our daily life, and the fact that the internet has become a part of our lives, the size of the risks and threats it brings has grown considerably. The expansion of the cyber environment day by day has transformed cyber attack methods into a system that updates itself day by day. Many methods continue to be developed to ensure information security in the cyberspace environment. The main objective of this chapter is to examine the vulnerabilities of privilege escalation used by cyber attackers and to explain what can be encountered in possible attack scenarios; measures that can be taken and methods that can be applied.
InfoSci-OnDemand Powered Search