Attacks and tools in cybercrime

|

Attacks Sometimes, an event that occurs on a computer or network is part of a series of steps to produce an unauthorized event. This event is then considered as part of an attack. An attack has several elements. First, it … Read More

Online security events, actions, and targets

|

Operation of computers and networks is composed of a series of events. An event is changing the state of a system or device. From information security point of view, these mood swings occur as a result of actions that are … Read More

Events, attacks and incidents for the security of online information

|

Three basic security concepts are important in terms of information on the Internet: confidentiality, integrity and availability. The concepts related to people who use this information are authentication, authorization and acceptance. When the information is read and copied by someone … Read More

Classification of risks and incidents in cyberworld

|

Classifications can be made according to several criteria. We will review some of them: Classification as a list of terms A popular but simplistic classification is a list of defined terms. An example is as follows: Cables and signals interception … Read More

Classification of cyber attackers according to their skills and objectives

|

Another presentation identifies five categories of intruders, each with different skills, levels of knowledge, especially with different objectives. All these categories can come from both outside and inside the company. The novice is usually a lone rookie. No computer experience … Read More

Typologies of cyber attackers

|

There have been numerous attempts to achieve a typology of perpetrators, their classification categories ranging from two to no more than 26. Criteria for delineation of these types are mainly two: the motivations of authors and their legal consequences. The … Read More

Cybercrime

|

In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and “steal” all your valuable data. Just as in the real world, … Read More

The first attacks on the Internet

|

November 2, 1988 is an important day for the Internet. On that day a graduate of Cornell University in the United States, Robert Morris Jr., executed a worm type program, the first program that has affected in a very serious … Read More

Peer-to-peer networks

|

Almost overnight, consumers everywhere have adopted an innovative technology that allows them to participate in a broader vision of the Internet. Distributed applications such as SETI@home have provided millions of users the opportunity to contribute to processing resources of their … Read More

Instant Messaging

|

Instant Messaging – IM – is the service which it says it will dethrone the future e- mail as the most popular means of communication. It is not a specific protocol , but a concept. As people began to spend … Read More

IRC

|

IRC stands for Internet Relay Chat, a service that enables real-time communication using text messaging – chat. Service is very popular among teenagers, but not limited to, being created a real culture around it. Very different communities have found an … Read More

FTP

|

FTP stands for File Transfer Protocol. His name reveals the purpose for which it was designed: it is used to transfer files over the Internet or generally over the TCP/IP networks. Its popularity has declined in recent years due to … Read More

1 2 3 4 5 6 8