Defining Best Practices to Prevent Zero-day and Polymorphic Attacks
| dc.contributor.author | Ganganagari, Praharsh Reddy | |
| dc.contributor.other | Rogers, Leonard (Supervisor) | |
| dc.date.accessioned | 2025-05-01T01:51:58Z | |
| dc.date.available | 2025-05-01T01:51:58Z | |
| dc.date.issued | 2021-10-04 | |
| dc.description | The main objective of this project is to study, analyse and define some of the best practices to prevent zero-day and polymorphic attacks. Zero-day refers to the vulnerability or an attack that has zero days between the time the vulnerability is discovered and the first attack. The operating systems and applications we use every day have vulnerabilities. The work analysis is focused on different techniques to detect/prevent these attacks. Among these, the best prevention techniques I recommend would be using honeypots and training employees and end users. Some recommendations are provided to make further improvements in the future. *Publication date not found. | |
| dc.identifier.doi | https://doi.org/10.7939/r3-5f1c-2e62 | |
| dc.language.iso | en | |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc/4.0/ | |
| dc.subject | Cybersecurity | |
| dc.subject | Zero-day attacks | |
| dc.subject | Polymorphic attacks | |
| dc.title | Defining Best Practices to Prevent Zero-day and Polymorphic Attacks | |
| dc.type | http://purl.org/coar/resource_type/c_93fc | |
| ual.jupiterAccess | http://terms.library.ualberta.ca/public |
Files
Original bundle
1 - 1 of 1
