Centro de Documentação da PJ
Analítico de Periódico

04.01 - Artigos digitalizados
KUMAR, Gulshan, e outro
Network security [Documento electrónico] : an updated perspective / Gulshan Kumar, Krishan Kumar
Systems Science & Control Engineering, London, Vol. 2, n. 1 (2014), p. 325-334
(*). Ficheiro de 334 KB em formato PDF (11 p.).


SEGURANÇA INFORMÁTICA, SEGURANÇA DE INFORMAÇÕES, CRIME INFORMÁTICO, PIRATARIA INFORMÁTICA, VÍRUS INFORMÁTICO

1. Introduction. 2. Security threats. Theft of data. Loss of time. Monetary loss. Disabled or crippled services. Legal exposure. Advanced persistent threats (APT).South African Postbank scam. Police Virus Scam. Social networks-based attacks. Eurograbber attack. Insiders’ attacks. Employees misuse or abuse attacks. Fully automated attacks. Social networking and other vulnerabilities. User-involved attacks: Email; Web; Instant messaging (IM); Peer-to-peer (P2P); Gaming; Software updates. DoS attacks. 3. Future trends. Cyber crime. Cyber espionage: APT; Growth of Malware; Malware for Mac; Mobile Phone Malware. Cyber warfare. Cyber activism. 4. Recommendations. 5. Conclusions.