[go: up one dir, main page]

Pompon, 2016 - Google Patents

Network Security

Pompon, 2016

Document ID
11388702150240947902
Author
Pompon R
Publication year
Publication venue
IT Security Risk Control Management: An Audit Preparation Plan

External Links

Snippet

Imagine a network worm using a variety of attacks to infect the most popular operating system on the Internet. The author of the worm was so technically skilled that within hours of being launched, it infected one out of ten machines on the Internet. It was called the Morris …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Singh et al. Hierarchical security paradigm for iot multiaccess edge computing
Cekerevac et al. Internet of things and the man-in-the-middle attacks–security and economic risks
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Oriyano Hacker techniques, tools, and incident handling
Suroto WLAN security: threats and countermeasures
Ndichu et al. A domains approach to remote access logical vulnerabilities classification
Swanink et al. Persistent effects of man-in-the-middle attacks
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Banoth et al. Modern cryptanalysis methods, advanced network attacks and cloud security
Ahmad et al. Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution
Sharp Network Security
Taib et al. Security mechanisms for the IPv4 to IPv6 transition
Pompon Network Security
Tolboom Computer Systems Security
Obidinnu et al. A survey of Attacks on VoIP networks and Countermeasures
Patra et al. Wireless network security threats and best method to warn
Singh et al. Five-layers sdp-based hierarchical security paradigm for multi-access edge computing
Ganapathy Virtual Dispersive Network in the Prevention of Third Party Interception: A Way of Dealing with Cyber Threat
Aledhari et al. Protecting Internet Traffic: Security Challenges and Solutions
Carmen et al. Wireless Network Security.
Lammle et al. CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam
Efe et al. Prevention Techniques for SSL Hacking Threats to E-Government Services
Qureshi Analysis of Network Security Through VAPT and Network Monitoring
Sadiku et al. Network Security
Chandru et al. A Comprehensive Review of MITM Attack Based on Detection and Prevention in Wireless