Pompon, 2016 - Google Patents
Network SecurityPompon, 2016
- Document ID
- 11388702150240947902
- Author
- Pompon R
- Publication year
- Publication venue
- IT Security Risk Control Management: An Audit Preparation Plan
External Links
Snippet
Imagine a network worm using a variety of attacks to infect the most popular operating system on the Internet. The author of the worm was so technically skilled that within hours of being launched, it infected one out of ten machines on the Internet. It was called the Morris …
- 238000000034 method 0 description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Singh et al. | Hierarchical security paradigm for iot multiaccess edge computing | |
Cekerevac et al. | Internet of things and the man-in-the-middle attacks–security and economic risks | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Oriyano | Hacker techniques, tools, and incident handling | |
Suroto | WLAN security: threats and countermeasures | |
Ndichu et al. | A domains approach to remote access logical vulnerabilities classification | |
Swanink et al. | Persistent effects of man-in-the-middle attacks | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Banoth et al. | Modern cryptanalysis methods, advanced network attacks and cloud security | |
Ahmad et al. | Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution | |
Sharp | Network Security | |
Taib et al. | Security mechanisms for the IPv4 to IPv6 transition | |
Pompon | Network Security | |
Tolboom | Computer Systems Security | |
Obidinnu et al. | A survey of Attacks on VoIP networks and Countermeasures | |
Patra et al. | Wireless network security threats and best method to warn | |
Singh et al. | Five-layers sdp-based hierarchical security paradigm for multi-access edge computing | |
Ganapathy | Virtual Dispersive Network in the Prevention of Third Party Interception: A Way of Dealing with Cyber Threat | |
Aledhari et al. | Protecting Internet Traffic: Security Challenges and Solutions | |
Carmen et al. | Wireless Network Security. | |
Lammle et al. | CCST Cisco Certified Support Technician Study Guide: Cybersecurity Exam | |
Efe et al. | Prevention Techniques for SSL Hacking Threats to E-Government Services | |
Qureshi | Analysis of Network Security Through VAPT and Network Monitoring | |
Sadiku et al. | Network Security | |
Chandru et al. | A Comprehensive Review of MITM Attack Based on Detection and Prevention in Wireless |