Internet Fraud as a Threat to Personal Information Security
نویسندگان
چکیده
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملInternet Worms as Internet-wide Threat
A computer worm is a program that propagates itself over a network, reproducing itself as it goes. Because of the recursive structure of this propagation, the spread rate of worms is very fast and poses a big threat on the Internet infrastructure as a whole. Modern worms are capable of gaining control over a substantial portion of the Internet hosts within several minutes. No human mediated res...
متن کاملA New Ecology Model for Internet Worm Security Threat Evaluation
Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. They created complex worm interactions as well as detrimental impact on infrastructure. Worm propagation analysis, including exploring mechanisms of predator-prey worms’ propagation and formulating effects of network/worm parameters, has great importance for worm containment and host protection. In this p...
متن کاملDiscovering Internet Resources to enrich a structured Personal information space
The Internet is a tremendous resource where one can find documents to enrich a personal information space. The question is: how can one find relevant documents and how can these be organized into an information space? In this paper, we describe a prototype which aims to provide the user with assistance in these two tasks. Our approach assumes the existence of an initial concept structure set up...
متن کاملKnowledge Discovery as a Threat to Database Security
This chapter investigates the affect of knowledge discovery from databases on the security of databases. First, it examines the current concern with database systems for security from knowl edge discovery. Second, this chapter discusses some of the potential security risks associated with knowledge discovery. Third, some potential structure for the development of controls for such systems is e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: NBI Technologies
سال: 2019
ISSN: 2658-3593
DOI: 10.15688/nbit.jvolsu.2019.2.4