The security gap It is the most common security methodology or method used in the IT sector and critical infrastructure such as oil and gas, nuclear power plants, and water treatment plants. We believe the airgap is a feasible alternative, and it may sound fantastic. But it isn't. Various research demonstrates that air gap security is not safe by exhibiting attacks such as acoustic emanations and electromagnetic interference. In this work, we will offer our study analysis to demonstrate that it is not secure. This paper will present research analysis and feasible air gap attack on the Semi-permeable Air Gap Technology

Analysis of airgap security attack vectors and mitigating strategies

SURESH BABU, NAVEEN KUMAR
2022/2023

Abstract

The security gap It is the most common security methodology or method used in the IT sector and critical infrastructure such as oil and gas, nuclear power plants, and water treatment plants. We believe the airgap is a feasible alternative, and it may sound fantastic. But it isn't. Various research demonstrates that air gap security is not safe by exhibiting attacks such as acoustic emanations and electromagnetic interference. In this work, we will offer our study analysis to demonstrate that it is not secure. This paper will present research analysis and feasible air gap attack on the Semi-permeable Air Gap Technology
2022
Analysis of airgap security attack vectors and mitigating strategies
Airgap security
Attack vectors
Preventing measures
File in questo prodotto:
File Dimensione Formato  
Cybersecurity_MsC_Thesis___Naveen (6).pdf

accesso aperto

Dimensione 2.61 MB
Formato Adobe PDF
2.61 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/46198