How hackers break into systems and making attacks harder by design

Activity: Talk or presentation typesInvited talk


The presentation explores how hackers actually break into systems and enterprises. It highlights the phases of a cyber-attack, the cyber kill-chain, internet-wide attacks, and government-level threats. An overview is given of typical vulnerabilities and possible backdoors in hardware, firmware, operating systems, and applications. The talk then explores ways to prevent these attacks, particularly how to design systems to be more resilient against attacks.
Period26 Jun 2019
Event titleNew Technologies, Mobility and Security
Event typeConference
Conference number10
LocationMeloneras, SpainShow on map
Degree of RecognitionInternational