TITLE

ATACURI INFORMATICE ÃŽN SPAÈšIUL CIBERNETIC Åžl METODE DE CONTRACARARE A ACESTORA

AUTHOR(S)
MANEA, Valentin
PUB. DATE
April 2013
SOURCE
Bulletin of the 'Carol I' National Defence University / Buletinu;Apr2013, Issue 2, p215
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The main purpose of cyber attacks have remained the same as in the situation of classic attacks, namely expanding or extending the influence of a state or entity over a certain objective, but the means of achieving that have changed, becoming more subtle and at the same time harder to be revealed and countered. Today we are witnessing an increasing number of attacks carried out in the cyberspace, as well as their increasing violence, while achieving a development of cyber attack capabilities, encouraged by huge investments made by some countries.
ACCESSION #
94442459

 

Related Articles

  • Cyberwar & International Law Step Zero. EICHENSEHR, KRISTEN E. // Texas International Law Journal;2015, Vol. 50 Issue 2, p355 

    The article reports on the challenges faced by the international law over cyber infrastructure and cyber warfare. Topics discussed include the technological innovation and development of international law; establishment of the "international law step-zero," and efficiency of application of...

  • Automated inference of past action instances in digital investigations. James, Joshua; Gladyshev, Pavel // International Journal of Information Security;Jun2015, Vol. 14 Issue 3, p249 

    As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance...

  • ISACA CYBERSECURITY NEXUS TOOLS HELP CYBER PROS.  // Computer Security Update;Feb2016, Vol. 17 Issue 2, p1 

    The article focuses on the launch of two Cybersecurity Nexus (CSX) tools by the Information System Audit and Control Association (ISACA) such as the Cybersecurity Career Road Map and the Threats and Controls. Topics discussed include the benefits offered by the tool to job seekers, the top three...

  • AhnLab Reports 2012 Mobile Security Threat Trends.  // Computer Security Update;Feb2012, Vol. 13 Issue 2, p1 

    The article reports on the major mobile security threat trends in 2011 and threat predictions for 2012 announced by integrated security solutions provider, AhnLab Inc. Mobile security threats in 2011 includes the growth of malicious codes that make direct billing, malware disguised as famous...

  • Reference Ontology for Cybersecurity Operational Information. TAKESHI TAKAHASHI; YOUKI KADOBAYASHI // Computer Journal;Oct2015, Vol. 58 Issue 10, p2297 

    As our cyber society develops and expands, the importance of cybersecurity operations is growing in response to cybersecurity threats coming from beyond national borders. Efficient cybersecurity operations require information exchanges that go beyond organizational borders. Various industry...

  • Is the U.S. at Risk From Cyberwarfare? McMillan, Robert // PCWorld;Oct2007, Vol. 25 Issue 10, p53 

    The article examines whether the U.S. is at risk from cyberwarfare. May 2007 was not a good month for decks in Estonia. The tiny Baltic republic weathered a month-long cyberattack that shuttered Internet servers nationwide. At the height of the crisis, people who wanted to use payment cards to...

  • Malicious Nodes Identification for Complex Network Based on Local Views. VERNIZE, GRAZIELLE; PIRES GUEDES, ANDRÉ LUIZ; PESSOA ALBINI, LUIZ CARLOS // Computer Journal;Oct2015, Vol. 58 Issue 10, p2476 

    Several social, biological and information systems can be described through complex network models. All complex networks display common structural features, such as the small-world and scale-free properties. However, the presence of selfish and/or malicious nodes can damage the network...

  • Toward a Taxonomy of Malware Behaviors. ABED GRÉGIO, ANDRÉ RICARDO; MONTE AFONSO, VITOR; FERNANDES FILHO, DARIO SIMÕES; DE GEUS, PAULO LÍCIO; JINO, MARIO // Computer Journal;Oct2015, Vol. 58 Issue 10, p2758 

    Malicious code attacks pose a serious threat to the security of information systems, as malware evolved from innocuous conceptual software to advanced and destructive cyber weapons. However, there is still the lack of a comprehensive and useful taxonomy to classify malware according to their...

  • Mitigation of Insider Attacks through Multi-Cloud. Gunasekhar, T.; Rao, K. Thirupathi; Reddy, V Krishna; kiran, P. Sai; Rao, B. Thirumala // International Journal of Electrical & Computer Engineering (2088;Feb2015, Vol. 5 Issue 1, p136 

    The malicious insider can be an employees, user and/or third party business partner. In cloud environment, clients may store sensitive data about their organization in cloud data centers. The cloud service provider should ensure integrity, security, access control and confidentiality about the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics