dc.contributor.author | MALISENCU, Denis | |
dc.date.accessioned | 2019-07-02T06:24:50Z | |
dc.date.available | 2019-07-02T06:24:50Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | MALISENCU, Denis. Attacks analyze in the computer networks. [Resursă electronică]. In: Conferinţa tehnico-ştiinţifică a studenţilor, masteranzilor şi doctoranzilor, Universitatea Tehnică a Moldovei, 26-29 martie, 2019. Chișinău, 2019, vol. 1, pp. 45-46. ISBN 978-9975-45-587-9. ISBN 978-9975-45-588-6 (Vol.1). | en_US |
dc.identifier.isbn | 978-9975-45-587-9 | |
dc.identifier.uri | http://repository.utm.md/handle/5014/2868 | |
dc.description | Resursă electronică | en_US |
dc.description.abstract | In computers and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset. A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices. The most common attacks are flooding, sniffing and spoofing. They are very destructive and can cause a lot of loss. Depending on context, cyberattacks can be part of cyberwarfare or cyberterrorism. A cyberattack can be employed by nation-states, individuals, groups, society or organizations. A cyberattack may originate from an anonymous source. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Tehnica UTM | en_US |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.subject | Flooding | en_US |
dc.subject | spoofing | en_US |
dc.subject | sniffing | en_US |
dc.subject | DoS | en_US |
dc.subject | MitM | en_US |
dc.subject | DNS | en_US |
dc.subject | ARP | en_US |
dc.subject | IP | en_US |
dc.title | Attacks analyze in the computer networks | en_US |
dc.type | Article | en_US |
The following license files are associated with this item: