Enterprise attack surface [1]

Enterprise attack surface [1]

Source publication
Preprint
Full-text available
Thanks to the advance of technology, all kinds of applications are becoming more complete and capable of performing complex tasks that save much of our time. But to perform these tasks, applications require that some personal information are shared, for example credit card, bank accounts, email addresses, etc. All these data must be transferred sec...

Context in source publication

Context 1
... company Attack Surface is made up of a relation between its devices and applications connected to the network [1] -summarized as things can go wrong from a cybersecurity standpoint -and the Attack Vectors, i.e, ways in which these things will go wrong. This relation is illustrated in Figure 1. ...

Similar publications

Article
Full-text available
Web applications have become a widely accepted method to support the internet for the past decade. Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities, the configuration is growing and becoming more complicated. The growing demand and complexity also make these web applicatio...