
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,028 |
تعداد مشاهده مقاله | 67,082,909 |
تعداد دریافت فایل اصل مقاله | 7,656,366 |
A Study and analysis of attacks by exploiting the source code against computer systems | ||
International Journal of Nonlinear Analysis and Applications | ||
دوره 12، Special Issue، اسفند 2021، صفحه 415-424 اصل مقاله (697.79 K) | ||
نوع مقاله: Review articles | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2021.5279 | ||
نویسنده | ||
Ahmed Badrulddin* | ||
Department of Law Affairs, Baghdad University Presidency, University of Baghdad, Iraq | ||
تاریخ دریافت: 25 فروردین 1400، تاریخ بازنگری: 03 خرداد 1400، تاریخ پذیرش: 20 خرداد 1400 | ||
چکیده | ||
An avalanche of threats from malicious used information and communication technologies (ICT) in political, military, economic and social affairs led to a deep awareness of the fact that new technologies may pose additional risks to international peace and safety. Thus, the problem of international information security, that is, the state of the spread of information among the countries of the world, with which excludes the possibility of violation of the rights of the individual and users in various state agencies and in all fields of knowledge. In the field of knowledge, as well as destructive and illegal impact on elements of the national critical information infrastructure, became an integral part of international security as a system of international relations based on the observance by all states of generally recognized principles and norms of international law and excluding the solution of controversial questions and disagreements between them through force or threat of force, in general. Thus, the principles of international security providing for promoting peaceful coexistence, being ensuring equal security for all states, the creation of effective guarantees in the military, political, economic and humanitarian spheres, preventing the race of nuclear and space weapons, respect for the sovereign rights of every people, fair political settlement of international crises and regional conflicts certainly include the creation of a system of international information security. At the same time, under the IIB system, designed for countering threats to strategic stability and ensuring equal partnership in the global digital environment, we understand the totality international and national norms and institutions, chief among which are the UN Regulated activities of various actors worldwide. | ||
کلیدواژهها | ||
Source Code؛ DNS Spoofing؛ DoS (Denial of Service) | ||
مراجع | ||
[1] D. Airehrour, Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model, mdpi, Information 2018, 9, 110; DOI:10.3390/info9050110. [2] Anatomy of an attack, available online: http://blogs.rsa.com/anatomy-of-an-attack/, last accessed on 2013. [3] T. Huang and Y. Zhao, Revolution of securities law in the Internet age: A review on equity crowd-funding, Comput. Law Secur. Rev., 33(6), 2017, pp. 802810 [4] T. Jagatic, N. Johnson, M. Jakobsson and F. Menczer,Social phishing, Communications of the ACM, 50(10) 2007 94-100. [5] D. JAVAHERI, Detection and Elimination of Spyware and Ransom ware by Intercepting Kernel-Level System Routines, IEEE, 6, 2018. [6] K. Krombholz, Advanced Social Engineering Attacks, Preprint submitted to Journal of Information Security and Applications, Journal of Information Security and Applications, 2014, DOI: 10.1016/j.jisa.2014.09.005. [7] Dr. G. Padmavathi and D. Shanmugapriya, A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, International Journal of Computer Science and Information Security, 4(1&2), 2009. [8] PriceWaterhouseCoopers. Adjusting the Lens on Economic Crime; PriceWaterhouseCoopers (PWC): Auckland,New Zealand, 2016.[9] S. Suman and Shubhangi, A Survey On Comparison Of Secure Routing Protocols in Wireless Sensor Networks, International Journal of Wireless Communications and Networking Technologies, 5(3), April - May 2016. [10] US Department of the Treasury. Financial Services Sector-Specific Plan; US Department of the Treasury: New York, NY, USA, 2015. [11] G. L. White, Education and prevention relationships on security incidents for home computers, J. Comput. Inf. Syst., 55(3), 2015, pp. 29-37. [12] K. Xing, S. S. R. Srinivasan, M Rivera, J. Li and X. Cheng, Attacks and Countermeasures in Sensor Networks: A Survey, Network security, Springer, 2005. | ||
آمار تعداد مشاهده مقاله: 44,182 تعداد دریافت فایل اصل مقاله: 438 |